NoScript intervention in online transaction verification

Ask for help about NoScript, no registration needed to post
grahamt
Posts: 14
Joined: Fri Dec 11, 2009 6:46 pm

NoScript intervention in online transaction verification

Post by grahamt »

I'm having problems with NoScript intervening in the online credit card transaction verification process. I need to know how I get around the problem.

When I carry out an online credit card transaction the vendor accepts my credit card details but then passes me to another website to carry out transaction verification. I will not be likely to know in advance the domain name of the website to which I am going to be passed and so cannot pre-authorise it but in most cases it requires Javascript to be activated. However, it is already too late because NoScript has already intervened in the display of the new website and in consequence has killed the transaction because I have not been able to enter the verification information required.

What I need is some way of NoScript asking for permission to continue with the display of the security verification webpage rather than blocking it outright.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.1.7) Gecko/20091221 Firefox/3.5.7 (.NET CLR 3.5.30729)
User avatar
Giorgio Maone
Site Admin
Posts: 9524
Joined: Wed Mar 18, 2009 11:22 pm
Location: Palermo - Italy
Contact:

Re: NoScript intervention in online transaction verification

Post by Giorgio Maone »

Do you get a XSS warning?
If so, did you try to use the "Unsafe reload" command from the Options menu on it?
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.1.7) Gecko/20091221 Firefox/3.5.7 (.NET CLR 3.5.30729)
grahamt
Posts: 14
Joined: Fri Dec 11, 2009 6:46 pm

Re: NoScript intervention in online transaction verification

Post by grahamt »

It's the reload that's the problem. Because of the order in which the transaction takes place, reloading the page is inadvisable as it may result in the transaction being processed twice rather than not at all. One is as bad as a the other!

What would be best is that if you are on a website where you know in advance that you are going to process a financial transaction online but you don't initially know which website URLs are going to be involved, because the company passes you across their own and external service provider websites, to be able to have an option which effectively says, "If the domain name changes from this point onwards, I won't block the new webpage but I will ask you if you want to proceed before displaying it and if you do will assume you are authorising the new domain."
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.1.7) Gecko/20091221 Firefox/3.5.7 (.NET CLR 3.5.30729)
User avatar
Giorgio Maone
Site Admin
Posts: 9524
Joined: Wed Mar 18, 2009 11:22 pm
Location: Palermo - Italy
Contact:

Re: NoScript intervention in online transaction verification

Post by Giorgio Maone »

grahamt wrote:It's the reload that's the problem. Because of the order in which the transaction takes place, reloading the page is inadvisable as it may result in the transaction being processed twice rather than not at all. One is as bad as a the other!
Nope, the "Unsafe reload" doesn't produce this side effect, because the POST payload had previously discarded turning the request into an idempotent GET request, and therefore no transaction took place yet.
to be able to have an option which effectively says, "If the domain name changes from this point onwards, I won't block the new webpage but I will ask you if you want to proceed before displaying it and if you do will assume you are authorising the new domain."
That's something which deserves to be considered, in one form or another. Thanks for the suggestion.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6
Alan Baxter
Ambassador
Posts: 1586
Joined: Fri Mar 20, 2009 4:47 am
Location: Colorado, USA

Re: NoScript intervention in online transaction verification

Post by Alan Baxter »

Giorgio Maone wrote:
grahamt wrote:It's the reload that's the problem. Because of the order in which the transaction takes place, reloading the page is inadvisable as it may result in the transaction being processed twice rather than not at all. One is as bad as a the other!
Nope, the "Unsafe reload" doesn't produce this side effect, because the POST payload had previously discarded turning the request into an idempotent GET request, and therefore no transaction took place yet.
An issue here is that a normal user doesn't know that when the problematic transaction happens. A cautious user won't do an "Unsafe reload" without checking here first, which makes for quite a usability issue. Sorry I can't suggest a solution.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6
Post Reply