[CLOSED] Temporarily Block All

Bug reports and enhancement requests
Post Reply
Onihikage
Posts: 2
Joined: Tue Nov 08, 2011 4:34 pm

[CLOSED] Temporarily Block All

Post by Onihikage »

Recently, a webcomic I follow was apparently hacked, and malicious code injected into the site. Firefox warned me about it because it had been blacklisted, but it made me think, that for cases when I'm warned that a site I already trust has been attacked, I'd like to have an option to disallow scripts globally. Otherwise I have to go into the whitelist and remove the related URLs, and will have to add them later when the hacks have been mended. When scripts are disallowed globally, we could still see which ones would normally be enabled/disabled, and enable/disable them from the menu, but regardless of changes, no scripts will run until this mode is turned off. Perhaps you could call it "Safe Mode" because it's sort of a return to the default, beginning settings so that settings can be changed from relative safety.
Last edited by Tom T. on Thu Nov 10, 2011 1:35 am, edited 1 time in total.
Reason: RFE withdrawn and topic closed
Mozilla/5.0 (Windows NT 5.1; rv:8.0) Gecko/20100101 Firefox/8.0
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: Temporarily Block All

Post by Tom T. »

This FAQ may ease your concerns.

According to NoScript Developer Giorgio Maone, 99.9%+ of the attacks you describe are of the type covered by that FAQ and the protections it provides.

For the maximum possible protection, on NoScript > Options >Embeddings page, check *everything*. This will cause a bit of inconvenience from time to time, in having to allow additional things (Flash videos, etc.) even at your whitelisted sites, but for the super-cautious, or super-paranoid, (I confess to both ;) ) the degree of protection is a favorable trade-off. IMHO. YMMV.
Perhaps you could call it "Safe Mode" because it's sort of a return to the default, beginning settings...
Actually, the default whitelist has grown a bit over the years, because of complaints from non-tech users that the most popular sites - Google, Yahoo, etc. -- didn't work. Or they just gave up and uninstalled NS. Naturally, you can delete from the default whitelist anything you like. But please know that even these giants have been exploited from time to time. Hence the protection described above. But by all means, trim your whitelist to keep it as small as possible, while not being too inconvenient.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.23) Gecko/20110920 Firefox/3.6.23
Onihikage
Posts: 2
Joined: Tue Nov 08, 2011 4:34 pm

Re: Temporarily Block All

Post by Onihikage »

Tom T. wrote:This FAQ may ease your concerns.

According to NoScript Developer Giorgio Maone, 99.9%+ of the attacks you describe are of the type covered by that FAQ and the protections it provides.

For the maximum possible protection, on NoScript > Options >Embeddings page, check *everything*. This will cause a bit of inconvenience from time to time, in having to allow additional things (Flash videos, etc.) even at your whitelisted sites, but for the super-cautious, or super-paranoid, (I confess to both ;) ) the degree of protection is a favorable trade-off. IMHO. YMMV.
Perhaps you could call it "Safe Mode" because it's sort of a return to the default, beginning settings...
Actually, the default whitelist has grown a bit over the years, because of complaints from non-tech users that the most popular sites - Google, Yahoo, etc. -- didn't work. Or they just gave up and uninstalled NS. Naturally, you can delete from the default whitelist anything you like. But please know that even these giants have been exploited from time to time. Hence the protection described above. But by all means, trim your whitelist to keep it as small as possible, while not being too inconvenient.
I see. Thanks for the info.
Mozilla/5.0 (Windows NT 6.1; rv:8.0) Gecko/20100101 Firefox/8.0
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: Temporarily Block All

Post by Tom T. »

You're very welcome. I'm glad that the information was helpful.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.24) Gecko/20111103 Firefox/3.6.24
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: [CLOSED] Temporarily Block All

Post by Tom T. »

If you're still subscribed to this topic, or otherwise see this, you might be interested in this recent topic, in which someone posts code that creates what looks like a link to Google. If you hover the mouse over the link, it shows Google's address in the lower-left status bar. Yet clicking it would take you to the programmer's site. It's just a demonstration, but for a real evildoer, this could trick many users into being sent to a malicious site that could do -- whatever. :o

Yet as you'll see in the thread, even if you have all scripting from Google allowed, NoScript defeats this attack by default. You don't have to do anything. In fact, the only way it works against a NS user is if you allow this strange third-party site that would show in the NS menu, when you think you're going to Google.
In the worst case, the attempted redirect is blocked, and you get a conspicuous warning telling you what is the real destination, and do you want to allow it? (Of course not.) It's not quite the same issue as you posted, but the idea of malicious code is still there.

You can see that those who don't use NoScript, or who use browsers that don't support NS, may be very vulnerable, depending on what, if any, protection their browsers offer. Seeing the actual attack, and seeing it blocked by NS -- if one picture is worth a thousand words, than one experience is worth a thousand pictures. Have a look. 8-)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.24) Gecko/20111103 Firefox/3.6.24
User avatar
therube
Ambassador
Posts: 7971
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Re: [CLOSED] Temporarily Block All

Post by therube »

There is no warning (from NoScript) one way or the other relating to dazsmith.com/simchamber.net.
(Unless you mean when that once there, when you click the NoScript icon, then it shows simchamber.net rather then google.com. But at that point, the URL bar does too.)
webcomic ... was ... hacked, and malicious code injected into the site
So long as the injected code is hosted on a foreign domain (one that is not Allowed, & seemingly there would be no reason for it to be Allowed), then you are safe. If the injected code was also hosted on webcomic.com & if you Allowed webcomic, then it could do as it pleases.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows NT 5.1; rv:9.0a2) Gecko/20111102 Firefox/9.0a2 SeaMonkey/2.6a2
Tom T.
Field Marshal
Posts: 3620
Joined: Fri Mar 20, 2009 6:58 am

Re: [CLOSED] Temporarily Block All

Post by Tom T. »

therube wrote:There is no warning (from NoScript) one way or the other relating to dazsmith.com/simchamber.net.
In the default state of NS, the redirection fails. The user may not even know anything malicious was attempted, as they properly land on Google.

If a user at the demo page opens NS menu, they find the default-denied dazsmith.com script in the menu. That would be strange for an alleged link to Google.
Regardless, they still get to Google so long as they don't allow this unknown script source. But seeing it would prompt some questions in the mind of an aware user.

In the later versions (F7 & F8), there's the 301 redirect warning, as described here.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.24) Gecko/20111103 Firefox/3.6.24
Post Reply