claustromaniac / httpz

Fat-free hardenable opportunistic encryption for Firefox
https://addons.mozilla.org/firefox/addon/httpz/
GNU General Public License v3.0
61 stars 5 forks source link

Exclusion (listing), non-effective when a server redirects to HTTPS #51

Closed grahamperrin closed 4 years ago

grahamperrin commented 4 years ago

With HTTPZ 0.11.3 disabled:

With the extension enabled:

A minor UX issue, I reckon.

claustromaniac commented 4 years ago

This is actually the intended behavior, and is not an issue.

Without HTTPZ

HTTP/1.1 301 Moved Permanently
Server: AkamaiGHost
Content-Length: 0
Location: https://helpx.adobe.com/flash-player.html
Date: Sat, 07 Dec 2019 00:00:00 GMT
Connection: keep-alive

With HTTPZ


Servers that redirect to HTTPS do not support HTTP. Excluding them is not only useless and unnecessary, it's detrimental. The problem is HTTPZ has no way to know what protocols are supported by a server before trying. If that were possible, I'd be able to make it so HTTPZ knows not to offer to exclude sites when a server does not support HTTP.

grahamperrin commented 4 years ago

Thanks, that makes sense.

So, just treat the exclusion (the listing) as negligible in cases such as this?


For this particular page, in reality I can't imagine anyone aiming to prefer HTTP. Online references to the non-secure address for the page must be vanishingly rare.

I chose to test an http:// link to Adobe's page only because its https:// address featured in https://github.com/EFForg/https-everywhere/issues/18726 … seemed like a :upside_down_face: thing to do. As if neither of us has anything better to do at a weekend.

claustromaniac commented 4 years ago

So, just treat the exclusion (the listing) as negligible in cases such as this?

I'm thinking I can let users know that the exclusions are not working because of external factors... I was going to wait until I implement the toolbar icon for that (#43), but now that I significantly changed how the page action works, this should be easier.

Sounds like an enhancement.

grahamperrin commented 4 years ago

Thanks 👍

I had to stare at it a few times before I got it, because I was testing more than one thing at once (following a www/nspluginwrapper routine).

image

The presence of insecure passive content is not due to partial effectiveness of exclusion from redirection to HTTPS. The insecure content results from a click on Adobe's Check Now button.


Also reminding myself, not all add-ons are disabled by safe mode. https://bugzilla.mozilla.org/show_bug.cgi?id=492271#c14 under Mozilla bug 492271 - "All Add-ons have been disabled in safe mode" is misleading in safe mode