Re: HTTPS Mixed content
Posted: Tue Nov 02, 2010 8:50 am
I see. So I guess you'd have to exempt ".twitter.com"?
NoScripters and WebSec nerds of all lands, unite!
https://forums.informaction.com/
Nope, in this case it would be better inserting a rule before the general http: -> https: one, in order to allow twimg.com only to be included by twitter, likessj100 wrote:I see. So I guess you'd have to exempt ".twitter.com"?
Code: Select all
Site .twimg.com
Accept INC(IMAGE) from .twitter.com
Code: Select all
Site http:
Anon INC from SECURE_SELF++
That makes sense, with http blocked the page is no longer mixed.ssj100 wrote:One thing I note is that with the rule enforced, this "Security Warning" doesn't come up in Firefox:
http://ssj100.fullsubject.com/security- ... 7.htm#2271
Yes, I guess that does make sense. However, it'd be nice to see a notice that http has been blocked on a https page (just like you can see a notice that Scripts have been blocked). Regardless, as I said, one method would be to simply disable the rule and only enable it when you come across such a warning in order to safely log in. I think that's a much more practical way of browsing. What do you think?al_9x wrote:That makes sense, with http blocked the page is no longer mixed.ssj100 wrote:One thing I note is that with the rule enforced, this "Security Warning" doesn't come up in Firefox:
http://ssj100.fullsubject.com/security- ... 7.htm#2271
but this should be ok, no harm in anoning third party requests too:al_9x wrote: abe, it seems can't quite express what's needed:there is currently no way to refer to the secure version of SELF++. What do you think about adding that?Code: Select all
Site http: Anon INC from SECURE_SELF++
Code: Select all
Site http:
Anon INC from https:
Nope. It would introduce ambiguous semantic, and we would need some new keyword to express Deny EVERYTHING from...al_9x wrote:I would say that 95%-100% of the time when people use a "from" clause they are thinking of sub-requests (INC) and consequently find the blockage of top level navigations a surprising and unwelcome side-effect. Shouldn't perhaps INC behavior be the default for from clauses?
While I can see the value of stricter checks, this is not technically a bug in the mixed content UI, because all it is meant to warn you about is that the page contains unencrypted content, which may be used to grab your credentials using a JavaScript DOM spy or keylogger. Network sniffing or MITM, done in during a page-less redirection, is out of the scope of the "Mixed content warning" feature.al_9x wrote: [*] but if you sniff, you'll see that https://static.sourceforge.net/css/ghost/style.php redirects first to http and again back to https
[*] this strikes me as a Fx bug, since the redirection can leak cookies. Unfortunately you need NS + web bug blocking to repro it on SF. Giorgio, if you think it's worth reporting, perhaps you can set up a public demo page for bugzilla, to take NS out the equation.
It might be nice to have, yes.al_9x wrote: there is currently no way to refer to the secure version of SELF++. What do you think about adding that?
but am now experiencing problems with images not loading up in my gmail messages.Site .twimg.com
Accept INC(IMAGE) from .twitter.com
Site http:
Deny INC from https:
You should look into Tools|Error Console for messages starting with [NoScript ABE] which refer to GMail, in order to figure out an exception.Dukeswharf wrote:but am now experiencing problems with images not loading up in my gmail messages.
Many thanks for the heads-up, Giorgio.Giorgio Maone wrote:You should look into Tools|Error Console for messages starting with [NoScript ABE] which refer to GMail, in order to figure out an exception.Dukeswharf wrote:but am now experiencing problems with images not loading up in my gmail messages.
Still successful. Still the red ! on the padlock icon.Dangerous Mixed Content was blocked! See for yourself...enter a fake username and password below and try it in other browsers.
I can't inject malicious code into this site to steal your identity.
Not at all. Please keep reading.ssj100 wrote:By the way, it's not just Hotmail that has a problem when you add that code. Yahoo Mail also has the same problem - you need to exempt ".yahoo.com" to be able to log in.
Never used Hotmail; been using Yahoo mail for many years.ssj100 wrote:From what you're saying, people shouldn't be using Hotmail and Yahoo? Last time I checked, the vast majority of people who have web-mail either use Hotmail or Yahoo? Do you have a Hotmail or Yahoo account? Can you check it out to see why they both require http content to be loaded into their https login process?
Code: Select all
0.0.0.0. www.yahoo.com
Code: Select all
Site ^http://
Accept from (whatever)
Deny from ^https://
Code: Select all
Site https://
Deny from http://