Closed
Bug 1289876
Opened 9 years ago
Closed 8 years ago
requests to http://127.0.0.1 from https-served pages should not cause mixed content warnings
Categories
(Core :: DOM: Security, defect, P3)
Core
DOM: Security
Tracking
()
RESOLVED
DUPLICATE
of bug 903966
People
(Reporter: pedrorolo, Unassigned)
Details
(Whiteboard: [domsecurity-backlog1])
Attachments
(1 file)
22.62 KB,
image/png
|
Details |
User Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.82 Safari/537.36
Steps to reproduce:
I made an application that serves jsonp via http and made it run on my machine.
I made a web page that performs jsonp requests against http://127.0.0.1:<port>/path.
I copied my web page into a https served public folder.
I loaded the page with a https:// url
Actual results:
when performing the requests to 127.0.0.1 the page is marked as unsafe due to mixed content.
Expected results:
The requests against 127.0.0.1 should have no effect on the mixed content status of the webpage, according to this w3c draft change:
<<Among other things, this means that http://127.0.0.1/ will not be considered mixed content when loaded in an otherwise secure page.>>
https://github.com/w3c/webappsec-mixed-content/commit/349501cdaa4b4dc1e2a8aacb216ced58fd316165
Reporter | ||
Updated•9 years ago
|
Summary: requests to 127.0.0.1 should not cause a mixed content warning → requests to http://127.0.0.1 from https-served pages should not cause a mixed content warnings
Reporter | ||
Updated•9 years ago
|
Summary: requests to http://127.0.0.1 from https-served pages should not cause a mixed content warnings → requests to http://127.0.0.1 from https-served pages should not cause mixed content warnings
Updated•9 years ago
|
Component: Untriaged → Security
Product: Firefox → Core
![]() |
||
Updated•9 years ago
|
Component: Security → DOM: Security
Version: 42 Branch → unspecified
Comment 1•9 years ago
|
||
This is a spec change for mixed-content-blocking that we have not implemented yet.
Status: UNCONFIRMED → NEW
Ever confirmed: true
Priority: -- → P3
Whiteboard: [domsecurity-backlog1]
Comment 2•8 years ago
|
||
This was fixed in bug 903966 for Firefox 55. The description of this bug ("http://127.0.0.1") is closer to what was actually implemented than the summary of that older bug ("localhost"). We're still arguing about using the named version because--stupid as it is--we have found cases in the wild where people have mapped localhost to remote machines rather than the loopback address.
Status: NEW → RESOLVED
Closed: 8 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•