* the default whitelist was deleted completely
* a new entry was added to the whitelist: `https://`
* this means JS is automatically allowed on all HTTPS sites
Now we visit play.google.com and try to search for something. It does not work and the UI does not react on a click.
Last edited by barbaz on Mon Dec 28, 2015 4:12 pm, edited 1 time in total.
Reason:Please don't embed slow-loading images in posts, link to them instead.
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0
barbaz wrote:Purely a NoScript issue: viewtopic.php?f=7&t=21277
Ah thanks for letting me know.
barbaz wrote:Also there is a "Allow HTTPS scripts globally on HTTPS documents" option that is somewhat safer than whitelisting the entire https internet
Thanks for the information, but how exactly is this more secure? And where exactly can I find this option?
BTW: If it is not "such safe" to whitelist https: is it also (a bit) unsafe to whitelist e.g. mega: (this is the "protocol" the Mega Firefox extension uses)?
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0
rugk wrote:Thanks for the information, but how exactly is this more secure?
It's more secure because less potential for MITM attacks in the plain http pages resulting in requests to the https pages crafted to suit the attacker's needs. None of the plain http stuff is allowed this way so that concern is thus avoided.
rugk wrote:And where exactly can I find this option?
NoScript Options > Advanced > HTTPS > Permissions
rugk wrote:BTW: If it is not "such safe" to whitelist https: is it also (a bit) unsafe to whitelist e.g. mega: (this is the "protocol" the Mega Firefox extension uses)?
No idea; I know nothing about that.
*Always* check the changelogs BEFORE updating that important software!
Thanks. So in this case should I also enable "Forbid active web content unless it comes from a secure"? What is the difference between these options?
And as for your explanation:
barbaz wrote:It's more secure because less potential for MITM attacks in the plain http pages resulting in requests to the https pages crafted to suit the attacker's needs. None of the plain http stuff is allowed this way so that concern is thus avoided.
So how exactly does this work? If scripts are not allowed on http sites they cannot load any resources so the only load would be through HTML script tags or similar things. Is this what is also disallowed? So does this setting also prevent http websites loading https JS content?
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0