Closed
Bug 769831
Opened 13 years ago
Closed 13 years ago
bmo anti-DDoS protection errantly blocking legitimate browsers
Categories
(Infrastructure & Operations Graveyard :: WebOps: Other, task)
Infrastructure & Operations Graveyard
WebOps: Other
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: fryn, Assigned: ashish)
References
()
Details
So we're working on this next-generation browser with the user agent string "Mozilla/6.0" and when I try visiting any page on https://bugzilla.mozilla.org/ , I get redirected to http://hardhat.mozilla.net/ , which redirects to http://hardhat.mozilla.net/en-US/outages.html . Please make Bugzilla compatible with the future.
Feel free to move this bug to another Product or Component as needed.
Updated•13 years ago
|
Assignee: nobody → server-ops-webops
Component: General → Server Operations: Web Operations
Product: bugzilla.mozilla.org → mozilla.org
QA Contact: general → cshields
Summary: Bugzilla does not support next-generation browser → bmo anti-DDoS protection errantly blocking legitimate browsers
Version: Production → other
Assignee | ||
Comment 1•13 years ago
|
||
IT had placed blocks to prevent (previously) illegitimate UAs from abusing bugzilla.m.o (tracked in Secutity Bug 717176). Since then, there has been no need to have the blocks in place and I've now removed them. Please verify if this is now fixed. Thanks!
Assignee: server-ops-webops → ashish
Status: NEW → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
Comment 2•13 years ago
|
||
There really isn't a Mozilla/6.0 UA, so if the checking for illegitimate UAs was providing any benefit whatsoever (or there is some feeling that it will in the future) then we might want to back this change out.
![]() |
Reporter | |
Comment 3•13 years ago
|
||
(In reply to Ashish Vijayaram [:ashish] from comment #1)
> IT had placed blocks to prevent (previously) illegitimate UAs from abusing
> bugzilla.m.o (tracked in Secutity Bug 717176). Since then, there has been no
> need to have the blocks in place and I've now removed them. Please verify if
> this is now fixed. Thanks!
(In reply to Jared Wein [:jaws] from comment #2)
> There really isn't a Mozilla/6.0 UA, so if the checking for illegitimate UAs
> was providing any benefit whatsoever (or there is some feeling that it will
> in the future) then we might want to back this change out.
Like Jared wrote, we were not actually working on a browser with the UA string of Mozilla/6.0. I had simply been testing how sites respond to different UAs.
We simply wanted to understand why Mozilla/6.0 and the like were being blocked.
We were not aware that it had to do with DDoS protection, as other sites were not blocking those UAs.
I agree with Jared, if we're still facing DDoS attacks and do not have a more precise defense.
Assignee | ||
Comment 4•13 years ago
|
||
There are no DDoS attacks now and as I mentioned in #c1, I have removed the blocks. Bugzilla is now, "compatible with the future" :)
Updated•12 years ago
|
Component: Server Operations: Web Operations → WebOps: Other
Product: mozilla.org → Infrastructure & Operations
Updated•6 years ago
|
Product: Infrastructure & Operations → Infrastructure & Operations Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•