handling SSL certificates
Posted: Fri Aug 21, 2015 9:45 pm
Recently, NoScript protected me from a possible XSS attack. At the end I will discuss the attack. While looking through the log output, something else caught my eye. Let me preface it in the following way.
From using Firefox we know that if we try to visit a page over HTTPS and there is a problem with the connection, certificate, etc. then there will be a warning message which tells us the connection is untrusted and presents us with some options. The options are something like
1. get me out of here
2. show me the details
3. I understand the risks and will click on through
The log report contained the following.
For the sake of argument, let me call the website www.mfs.com, where mfs stands for "my favorite site." I connected to https://www.mfs.com without difficulty. In NoScript I allowed the script for https://www.mfs.com. I allowed another script, https://ssl-mfs-blahblahblah.com, which I needed to use the website properly. (Since I use RequestPolicy also, I needed to let the two sites talk to one another.) The website seemed to function properly. Later, when I looked at the log report I noticed the following:
ssl-mfs-blahblahblah.com:443 uses an invalid security certificate.
The certificate is only valid for *.someothersite.com
(Error code: ssl_error_bad_cert_domain)
<unknown>
What happened? If I had tried to visit ssl-mfs-blahblahblah.com directly then would Firefox have presented the usual warning message? If so, did NoScript choose the “get me out of here" option or the “I understand the risks and will click on through" option? Is there a way for NoScript to notify me of such a situation and let me choose the course of action?
Otherwise, as for the possible XSS attack, on https://www.mfs.com I opened a link to www.somethingelse.com. It offered a choice between http://www.somethingelse.com and https://www.somethingelse.com. That triggered the alert from NoScript. I closed the link. The log report said NoScript “Sanitized suspicious upload...transformed into a download-only GET request.”
Thanks,
Ryan
(P.S. Later I did visit ssl-mfs-blahblahblah.com and received such a warning from Firefox.)
From using Firefox we know that if we try to visit a page over HTTPS and there is a problem with the connection, certificate, etc. then there will be a warning message which tells us the connection is untrusted and presents us with some options. The options are something like
1. get me out of here
2. show me the details
3. I understand the risks and will click on through
The log report contained the following.
For the sake of argument, let me call the website www.mfs.com, where mfs stands for "my favorite site." I connected to https://www.mfs.com without difficulty. In NoScript I allowed the script for https://www.mfs.com. I allowed another script, https://ssl-mfs-blahblahblah.com, which I needed to use the website properly. (Since I use RequestPolicy also, I needed to let the two sites talk to one another.) The website seemed to function properly. Later, when I looked at the log report I noticed the following:
ssl-mfs-blahblahblah.com:443 uses an invalid security certificate.
The certificate is only valid for *.someothersite.com
(Error code: ssl_error_bad_cert_domain)
<unknown>
What happened? If I had tried to visit ssl-mfs-blahblahblah.com directly then would Firefox have presented the usual warning message? If so, did NoScript choose the “get me out of here" option or the “I understand the risks and will click on through" option? Is there a way for NoScript to notify me of such a situation and let me choose the course of action?
Otherwise, as for the possible XSS attack, on https://www.mfs.com I opened a link to www.somethingelse.com. It offered a choice between http://www.somethingelse.com and https://www.somethingelse.com. That triggered the alert from NoScript. I closed the link. The log report said NoScript “Sanitized suspicious upload...transformed into a download-only GET request.”
Thanks,
Ryan
(P.S. Later I did visit ssl-mfs-blahblahblah.com and received such a warning from Firefox.)