Closed Bug 1289876 Opened 9 years ago Closed 8 years ago

requests to http://127.0.0.1 from https-served pages should not cause mixed content warnings

Categories

(Core :: DOM: Security, defect, P3)

defect

Tracking

()

RESOLVED DUPLICATE of bug 903966

People

(Reporter: pedrorolo, Unassigned)

Details

(Whiteboard: [domsecurity-backlog1])

Attachments

(1 file)

User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.82 Safari/537.36 Steps to reproduce: I made an application that serves jsonp via http and made it run on my machine. I made a web page that performs jsonp requests against http://127.0.0.1:<port>/path. I copied my web page into a https served public folder. I loaded the page with a https:// url Actual results: when performing the requests to 127.0.0.1 the page is marked as unsafe due to mixed content. Expected results: The requests against 127.0.0.1 should have no effect on the mixed content status of the webpage, according to this w3c draft change: <<Among other things, this means that http://127.0.0.1/ will not be considered mixed content when loaded in an otherwise secure page.>> https://github.com/w3c/webappsec-mixed-content/commit/349501cdaa4b4dc1e2a8aacb216ced58fd316165
Summary: requests to 127.0.0.1 should not cause a mixed content warning → requests to http://127.0.0.1 from https-served pages should not cause a mixed content warnings
Summary: requests to http://127.0.0.1 from https-served pages should not cause a mixed content warnings → requests to http://127.0.0.1 from https-served pages should not cause mixed content warnings
Component: Untriaged → Security
Product: Firefox → Core
Component: Security → DOM: Security
Version: 42 Branch → unspecified
This is a spec change for mixed-content-blocking that we have not implemented yet.
Status: UNCONFIRMED → NEW
Ever confirmed: true
Priority: -- → P3
Whiteboard: [domsecurity-backlog1]
This was fixed in bug 903966 for Firefox 55. The description of this bug ("http://127.0.0.1") is closer to what was actually implemented than the summary of that older bug ("localhost"). We're still arguing about using the named version because--stupid as it is--we have found cases in the wild where people have mapped localhost to remote machines rather than the loopback address.
Status: NEW → RESOLVED
Closed: 8 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: