The default bug view has changed. See this FAQ.

add Syrian IDN ccTLD souria (xn--ogbpf8fl) to whitelist




Networking: Domain Lists
6 years ago
6 years ago


(Reporter: Mustafa AL Rifaee, Assigned: gerv)




Firefox Tracking Flags

(status2.0 .x-fixed, status1.9.2 .18-fixed, status1.9.1 .20-fixed)




(1 attachment)



6 years ago
User-Agent:       Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv: Gecko/20101203 Firefox/3.6.13
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv: Gecko/20101203 Firefox/3.6.13

When we put an Arabic IDN domain name under our new IDN ccTLD (xn--ogbpf8fl)
it is displayed using the A-Label (Latin) representation not the native Arabic
characters. This can be solved locally by modifying the about:config file. We
hope that the Syrian IDN ccTLD (xn--ogbpf8fl) is included as part of the Network
Whitelist. We are using the standard Code Points for the Arabic Language
available at

Reproducible: Always

Comment 1

6 years ago
see bug 607938
Component: General → Networking: Domain Lists
OS: Windows 7 → All
Product: Firefox → Core
QA Contact: general → networking.domain-lists
Hardware: x86 → All

Comment 2

6 years ago
Mustafa, do you work for STE ?

Comment 3

6 years ago
(In reply to comment #2)
> Mustafa, do you work for STE ?
Hello Mr.Hermans;
I worked in STE previously, but now i am working in National Agency for Network Services (NANS), NANS is a government entity established in 2009 by a legislative law called Digital Signature and Network Service Law (Law  number 4 dated 25/2/ 2009) which has been approved by  the Syrian Parliament as a step toward governmental reform of the Telecom and Internet Sector in Syria. This law assigned to NANS many responsibilities and functions related to data network services such as:
•	To manage the Syrian ccTLDs (including the IDN ccTLD) 
•	To define policies and rules for domains registration.
and we recently get the delegation for (.SY and IDN) from IANA (
 Best Regards

Comment 4

6 years ago
I think Wikipedia needs to be updated, it still mentions STE as the registry :-)
Ever confirmed: true

Comment 5

6 years ago
Mustafa is the listed technical contact in the IANA database for .<Souria>

With respect to .<Souria>  Being whitelisted, I see no reasons not to.

The registration rules are located here:

Registration Rules forbid confusingly similar string registration (as best I can tell with the aid of my handy Google Translate)

Mustafa, the reporter, has identified the standard code points are here:

Codepoints are identical to Saudi Arabia's, which are already white-listed

Reccomendation:  Approve addition


6 years ago
Assignee: nobody → jothan

Comment 6

6 years ago
Creating patch to include this in the whitelist

Comment 7

6 years ago
Changing to assigned and assigning it to me

Comment 8

6 years ago
Created attachment 534501 [details] [diff] [review]
Adds .<Souria> to IDN Whitelist in all.js

Please see comment thread today.  

I have verified that the reporter is officially from the appropriate and authorized registry, that there are rules in the t&c for the registration of names, and that they use the identical codepoints for a TLD that is currently whitelisted.


6 years ago
Assignee: jothan → gerv

Comment 9

6 years ago

Last Resolved: 6 years ago
Resolution: --- → FIXED


6 years ago
Attachment #534501 - Flags: approval2.0?
Attachment #534501 - Flags: approval1.9.2.18?
Attachment #534501 - Flags: approval1.9.1.20?
Comment on attachment 534501 [details] [diff] [review]
Adds .<Souria> to IDN Whitelist in all.js

Approved for and, a=dveditz for release-drivers
Approved for the mozilla2.0 repository, a=dveditz for release-drivers
Attachment #534501 - Flags: approval2.0?
Attachment #534501 - Flags: approval2.0+
Attachment #534501 - Flags: approval1.9.2.18?
Attachment #534501 - Flags: approval1.9.2.18+
Attachment #534501 - Flags: approval1.9.1.20?
Attachment #534501 - Flags: approval1.9.1.20+

Comment 11

6 years ago

status1.9.1: --- → .20-fixed
status1.9.2: --- → .18-fixed
status2.0: --- → .x-fixed
Verified in source for
Keywords: verified1.9.2
You need to log in before you can comment on or make changes to this bug.