Closed Bug 141641 Opened 23 years ago Closed 22 years ago

disabling cross-site HTTPS referrers breaks sites [was: when leaving https, should send host+port as referrer instead of no referer]

Categories

(Core :: Networking: HTTP, enhancement, P5)

enhancement

Tracking

()

VERIFIED FIXED
mozilla1.2beta

People

(Reporter: staff, Assigned: darin.moz)

References

()

Details

(Keywords: topembed+, Whiteboard: [adt2] [ETA 09/18])

Attachments

(1 file)

Mozilla intentionally (I think) hides the referer when going from one HTTPS page to another in a different domain. This is a *very* bad design decision, as it prevents using at least one major online credit card processing service which looks for referer information (along with other info) for security checks. Currently we have been telling our customers that they have to use IE because mozilla/netscape simply does not work. We do not want to do this! I understand that this is done to improve security, since some sites place private information in plain text in URLs. Consider, though, that this is a problem with the site and cannot be fixed by the browser. For example, if someone walks by a person using the insecure site there private information will be right there on the screen ready to read (in the URL). The decision to make fundamentally insecure sites more secure is causing the browser to be *much* less usefull overall since it can often not be used to place orders online, forcing users to switch back to IE. By default, referer information should be included when jumping from one HTTPS page to another in a different domain. If you want to go beyond that and add the option (not selected by default!) of not providing the referer in this case, fine. I hope this descision will be reconsidered! Thanks
Blocks: 61660
Reporter (Alan): what site or sites does this bug affect? According to bug 128213, there's a hidden pref an advanced user can set to allow referer information to be sent from one https site to another. That's just wrong in so many ways: 1. Yet another (hidden) pref. Hurts startup time, complicates code, doesn't do anything useful. 2. Why does it matter whether the target is http or https? 3. Giving sites a way to prevent the referer from being sent is, IMO, a security hole. A minor one, but enough of a hole that many porn sites refuse image requests when the referrer is not sent instead of assuming that the request is from a bookmark. I think the best solution is to send the referer but strip off the pathname, query string, and hash. For example, a link from https://answers.google.com/answers/main?cmd=threadview&id=8149 would have its referrer set to https://answers.google.com/.
Yeah, that last solution you propose was what badami, darin, mstoltz all seemed to agree to last time I mailed them about it... (send referrer from https to https, but strip everything but the hostname out of the url).
Status: UNCONFIRMED → NEW
Ever confirmed: true
Alan, thanks for your report and that you care about Mozilla-based products. Which site are we talking about? Which information does it exactly what to see in the referrer? E.g. is *any* referrer (even a wrong one) sufficient? Is the hostname of the referring site sufficient? DOes it need the full, valid referrer? Any site which relies on the Referrer header to be present is broken and violates the HTTP specification. The spec is ultra-clear that the referrer is something optional that can be disabled on the user's discretion. Please notify the site about that. Reference: RFC 2616, sections 14.36, 15.1.2 and 15.1.3. The latter also says: Clients SHOULD NOT include a Referer header field in a (non-secure) HTTP request if the referring page was transferred with a secure protocol. This is not exact the case discussed here, but might be worth consideration. Sending the hostname of the referring host as Referrer between 2 https hosts might strictly be a violation of the HTTP spec. The hostname is not "the address (URI) of the resource from which the Request-URI was obtained". Apart from that, I currently don't know a reason not to send the hostname in this case.
The credit card processor in this case is authorize.net. Perhaps there are others as well. Thousands of sites (including my site, FreeFind.com) use this service to handle credit card transactions, but it does require a referer to be set. To guarantee complete compatibility with what's out there now, you'd need to send the complete URL. I would guess that stripping just the query string would probably work for most cases. Only sites which have them in their order processing sequence would need to update their credit card processing security handshake info. If you set the referer to just the domain name it would force essentially all sites using authorize.net to reconfigure their security handshake info before mozilla would work. Ideally they would (and I certainly would), but I think that practically speaking most would not. In a way, this does sound safest (if your willing to have your users take the compatibility/usability hit), but in some cases it might be less safe. For instance, the referer for two different sites: https://lotsasites.com/~userA/ and https://lotsasites.com/~userB/ would be the same... (and again, yes I know that the referer shouldn't be part of a security mechanism, but what is out there being used is what the browser needs to work with..) Again, where I've noticed this is going from a HTTPS page on one site (my site) to an HTTPS page on a different site (the credit card processor's site). And this may be more widespread than the thousands of sites using authorize.net. It's easy to envision lots of services having a referer check as part of their security mechanism. I have notified authorize.net of the problem. We've been experiencing this for months now, but they seem to be asleep at the wheel on this. For me, this underlines the importance of having mozilla work with the way things are currently set up on the net and not force people (both developers and users) to reconfig/recode/conform in order to support mozilla. I think that's very important to success. Given the above, I would recommend (and I hate to say this..gag) referer behavior that is 100% compatible with IE, at least by default. If including query strings is truly out of the question then at least keep everything else (the path). Think "always compatible" and thanks again, Alan
will address this for moz 1.0.1
Status: NEW → ASSIGNED
Priority: -- → P2
Target Milestone: --- → mozilla1.0.1
Before sending the full path, I can't we try to advocate the broken site not to require a referrer? Move to evang?
[diatribe] Even if you could get authorize.net to update their system to support mozilla (and I think there are real issues with getting them to abandon referers, which are already intergrated into their system), what about the thousands of other sites that you don't know about that rely on the referer for some check/feature/etc? How do you track those sites down and tell them to re-code too? Even if you could track them down, would they? or would you just be systematically offending the internet community? (While your at it, you could tell them to get all the syntax errors out of their HTML pages, too ;) This is a basic compatibility issue. How compatible you want your browser to be? Do you think that most people will keep on using it if they have a small but steady stream of problems with it? [/diatribe] :)
Target Milestone: mozilla1.0.1 → ---
mass futuring of untargeted bugs
Target Milestone: --- → Future
Summary: Current HTTPS referer handling preventing online credit card processing → when leaving https, should send host+port as referer instead of no referer
Alan, there are not thousands of sites. This is a corner case any this site is the only problem we know of. I just called customer support of Authorzie.net, which declined to let me speak with a developer, claimed that this is working fine with Netscape 6.2 and refused to change their site. Well, their problem, I'd say.
And it seemed to work fine with their test account for WebLink with Beonex Communicator with the fake 3rd party referrers option enabled (bug 55477).
*** Bug 151640 has been marked as a duplicate of this bug. ***
Ben, I just tried again with the latest Mozilla 1.1 alpha (build 2002061104) and the very latest netscape (6.2.3) with the same (failing) results. It is my understanding that authorizenet has thousands of customers, each of whom is a webmaster with their own site(s), so this problem is probably greater than a single site. It is very difficult to get complete/accurate feedback from users (of all types), so I would hesitate to conclude anything about the scope of the problem based on lack of feedback. Typically only a minute percentage of people provide feedback even when it would be trivial to do so. When there are additional obstacles to providing feedback (registering for bugzilla and figuring it out, for example) you can expect even less than a minute percentage. Furthermore in the case of browser software, first a small percentage of the end users will be complaining to the webmaster with the problem ("your website doesn't work"), and then a small percentage of those webmasters will be then be downloading mozilla, testing, and then bugzillaing the feedback on to you. To make the challenge of writing a compatible browser even more difficult, it is difficult if not impossible to comprehensively "test the web" to make sure your browser is compatibile, especially when the test may involve buying things online! Because it is impossible to truly test the web and because getting a statistically significant quantity of feedback from users is problematic, it seems that a good strategy to ensure compatibility for web users would be to compare mozilla's precise behavior with ..I truly hate to say this.. IE, since that is the current standard. Insisting that companies re-write their code to be techinically correct is clearly a non-starter. One phone call to authorizenet (or more, as I have made!) demostrates this conclusively. Technically unconforming sites might be "their problem" but in fact it is "your problem" because if mozilla doesn't work everywhere they go the users will not keep using it regardless of "whose problem" it actually is. So my recommendation for the success of Mozilla is to be maximally compatible - work like (...) IE, even if IE is wrong. ..hmmm...there's a option for you! (x) IE compatibility mode ( ) mozilla RFC validator mode As for my specific case, all *I* personally need is for mozilla to by default send something (anything!) in the HTTP referer field in this specific case. Even "this referer was not set due to security concerns" would work. Then I could adjust my authorizenet account to accept it. :) Thanks again
My company's icon technology makes specific use of the browser's referrer field. We are yet another example of a company that uses the browser's referrer field for added security and to provide a service. Our model has proven to work in all browsers until this more recent change to the Netscape source to prevent referrers from being passed from one HTTPS domain to another. The omission of the referrer results in our icon not being displayed to the end user(the browser) making the browser much less useful. I too would not like to suggest to all of our customer's customers to not use any Netscape browser products. Even if the browser only sent over the referring domain I could work out solution. GeoTrust's icons get millions of hits per week, and provide valuable information to the end user. I do not see anywhere in RFC2616 where it states the referrer should be omitted in HTTPS if another server is also HTTPS. If the user feels he has privacy concerns and wishes to disable referrer sending, and therefore disable services like GeoTrust's True Site, that is ok. But by default the browser should be sending this vital information along. This is not the only case where referrer sending has been left to the programmer's interpretation. Another example of where the referrer is not sent would be in SCRIPT SRC tags. Again Netscape browser's do not send a referrer, while other browsers do. Making the Netscape browsers a little less useful again.
> Another example of where the referrer is not sent would be in SCRIPT SRC tags Irrelevant to this bug, and fixed in bug 64248 a while back... 7.0beta1 should be sending "Referer:" in that situation, modulo this bug.
*** Bug 154062 has been marked as a duplicate of this bug. ***
*** Bug 157054 has been marked as a duplicate of this bug. ***
we're also suffering from this problem. our website uses third party for a drug info. they provide us with a drug description and info http://cp.gsm.com/ we link to them from regular pages and from secured pages. the latter links don't work :( they use HTTP_REFERER as some sort of authorization. yesterday i filed a bug 157054 that is a dup of this one.
It seems from the comments that it is a authorize.net problem. The referer field is optional in the HTTP specs; So I agree 100% I agree with Comment #3 From Ben Bucksch. It seems to me also, from the doc of authorize.net (see: https://secure.authorize.net/docs/developersguide.pml ) that this strange behaviour should occur only in WEBLINK mode (and perhaps ADC RELAY RESPONSE). It should not occur in ADC DIRECT RESPONSE, because the commnunication process relies only on the server (not on the browser). Am I right?
The issue isn’t about whether or not the Referrer is optional or not. The issue is that many applications use this field as an added security check. If someone wishes to disable Referrer passing, and therefore not have access to the application that checks it, so be it. But until recently all browsers passed Referrer regardless if they were under HTTP or HTTPS. I agree with the suggestion to not pass GET data in the Referrer, but a Referrer should be passed by default in my opinion. As a site administrator I want to share my own content between domains. But I don’t want unauthorized sites to use my content, and my bandwidth. So I put a simple check in my configuration to state which domains (Referrers) are allowed to get at the content. With the recent change I can’t make this check, and therefore I can’t get at my own content. This is merely one of many examples. It is not necessarily a fault of the application. The application acts as expected: The security check fails therefore the action is not performed. But as an end user, or the client of the application, this is not the desired behavior, and there is no way to fix it other than using a “working” browser (IE, Netscape <4, Opera, etc).
John, this is *clearly* a fault of the application. The HTTP standard says that the Referer is optional, meaning that the site *must not* rely on it. If it does, it does not comply to HTTP anymore. Even worse are browsers passing Referers from HTTPS to HTTP. I don't know, if any one does that, but it would be a clear violation of HTTP, and a potential security problem. All we are talking about is *maybe* adding a workaround for a certain egde case. But the fact remains that the site is at fault.
> a fault of the application. s/application/website/
> Even worse are browsers passing Referers from HTTPS to HTTP. what about going from HTTPS to HTTPS on another host? i think it should pass the referer in that case. what does the HTTP spec sez about it?
I am not fighting to change the standard at the moment. I understand that the Referrer is optional. But many WWW sites provide functionality based upon the Referrer. The example case I listed above is used by many web administrators, mainly to restrict content down to a single domain, but sometimes to a list of domains. Search around and you will find many examples on how to enable this "security" feature for your content. If I were to follow your point to completion, why send a referrer ever? It is optional, so why not just delete it completely? The answer is because it provides the WWW server being called valuable information it can use to make simple security checks, fraud checks, etc. I am largely responsible for the icon technology we use here at GeoTrust. I don't consider my application broken. It does just what it should, if I am not sent a referrer I have no idea which icon I should render, therefore I render nothing. I followed the specification, I don’t crash because I don’t get a referrer, but I also can’t provide the client with the functionality they want. I have not seen an example where an HTTPS page sends a referrer to an HTTP page. This would be a clear violation of the specification. But HTTP to HTTP, or HTTPS to HTTPS, is not a violation, and is what browsers have been doing since the beginning of the WWW. I obviously do not believe this is a fault of the application. The application looks for information it gets from “working” browsers, and acts upon that information. If the information is missing, it does nothing. That is following the specification to the letter. By not sending referrer the browser is merely proving to be less useful to clients and servers. Therefore consumers will simply use a browser that provides them the content/features/actions they desire. We now have about a million hits a day on our icon. And currently 90% of the browsers hits are from IE. Personally I’d like to see an alternative, but this issue is an example of why there isn’t right now.
For what it's worth, Bank of America's eStores Settle Up Credit Card processing system also uses HTTP_REFERRER to authorize credit card transactions: "When a customer places an order, the address of the site generating the order is compared to this list of sites authorized by the merchant before the transaction is submitted for payment processing. If the addresses do not match, the order is rejected and no credit card authorization is obtained. When the addresses match, the order is submitted for credit card authorization and finalized accordingly." BofA's system returns a "site not authorized to post" error. Sure enough, in using their debugging system, HTTP_REFERRER is not passed.
i think we should settle on a solution for this bug by mozilla 1.2 ... our current solution (of a hidden pref) is just not satisfactory.
Target Milestone: Future → mozilla1.2alpha
Keywords: topembedtopembed+
Target Milestone: mozilla1.2alpha → mozilla1.2beta
Summary: when leaving https, should send host+port as referer instead of no referer → when leaving https, should send host+port as referrer instead of no referer
i'm treating this as an enhancement bug right now. our current security policy prevents sending a referrer in this case. i'm not sure if we can reasonably do anything... sending a only the prepath as a referrer is breaking the spec (lying to the website) and sending the complete referrer is really putting the user at risk. i'm also not sure how many sites break because of our restrictive security policy. all this makes it very difficult to determine the best solution for this bug.
Severity: major → enhancement
Priority: P2 → P5
I for one would prefer to see half of the truth as apposed to nothing. Does the specification state that the entire GET string must be sent as part of the Referrer? I didn't infer that, the spec states: Referer = "Referer" ":" ( absoluteURI | relativeURI ) Example: Referer: http://www.w3.org/hypertext/DataSources/Overview.html The definition of absoluteURI shows Query String as optional. So isn't sending the complete referrer without the query string acceptable? I don't see this as being a security risk. If you want to provide a paranoid option for turning off referrer that's fine. But by default the solutions already suggested seem appropriate. Every day I come across another cgi/web application that makes use of referrer. Luckily for you most applications are running under HTTP so this bug doesn't show its ugly head often. But more and more people are realizing they do need SSL for these applications. We had hoped this bug would have been resolved many months ago. Certainly before the Mozilla 1.1, and Netscape 7 were released. Webmasters and end users are getting frustrated, and our only work around is to suggest not using Mozilla based browsers. You are losing many loyal fans because of issues like this. Our icon is now getting a couple of million hits a day. We are still receiving complaints about all of the new Mozilla based browsers. More alarming to you should be the statistics we are noticing, before this bug was introduced we had about 86% IE hits, now we are seeing closer to 93% IE hits.
I've always thought that https->https should send referrer. The spec says: (rfc2616, 15.1.3): Clients SHOULD NOT include a Referer header field in a (non-secure) HTTP request if the referring page was transferred with a secure protocol. so HTTPs is not a "(non-secure HTTP request)", so the refererer should be sent. I think that the main purpose of this is so that a GET login to an https page doesn't then get sent out in the clear subsequently. This does leave open the case of a link on the original server to an https page which grabs the referer in some malicious way. GET login requests are evil anyway. ISTR getting outvoted last time, htough...
Any bad guy can run an https site...
Right, but you'd ahve to get that 'bad guy' to get a link to their page onto the other site's https page. Not impossible, but its not something 'anyone' can do
What about XSS (Cross Site Scripting)? It would be hard, but not impossible to create a link that would appear legit.
isn't cross site scripting a same origin violation? so wouldn't the user have to explicitly allow it (assuming signed js were involved)? given that the attacker would have to add their link to the legitimate site's pages, i'm inclined to agree with bradley. what is the real risk of enabling cross site HTTPS referrers? websites can anyways link to other HTTPS sites indirectly via a HTTP redirect if they really don't like this behavior, which i'm sure they're well acquainted with since IE sends cross site HTTPS referrers. are we really helping by preventing cross site HTTPS referrers?
fixed summary to state the problem instead of just one of the proposed solutions.
Keywords: 4xp
Summary: when leaving https, should send host+port as referrer instead of no referer → disabling cross-site HTTPS referrers breaks sites [was: when leaving https, should send host+port as referrer instead of no referer]
I assume we send no referrer when the user types something in the url bar, right? If so, I'm also leaning toward allowing this....
right, no referrer should be sent in that case.
> isn't cross site scripting a same origin violation? It's not scripting, but just linking. What about e.g. webmail? Not all webmail sites are sane... I still think that any site depending on referrers is broken per the HTTP spec, especially in this case. IMO, this is an Evang issue, not a browser issue. Why can't we first try to solve this via Evang, like we do with many other cases?
Don't forget that this can't happen automatically, because if js was enabled, then the malicious page just has to grab the current rul via js. If js is disabled, then you have to entice someone to click on an https page to an https page on another domain, where the current URL has sensitive information encoded as part of a GET url.
> If js is disabled, then you have to entice someone to click on an https page to > an https page on another domain No clicks needed. Think of images in HTML mail sent to webmail accounts.
Darin states that he's not sure how many sites are affected. Every single online store that uses authorize.net's Automated Direct Connect Relay Response mechanism will not work. I don't know how many customers authorize.net has, but my guess would be that it is in the thousands. I'm tired of having MSIE as a "backup browser". I get so frustrated when I have to revert to it to conduct business on the Web. We can sit back and blame the site designers or we can accept the reality of today's imperfect Web and accomodate some of the major mistakes. If I understand correctly, the reason you don't send the referrer is to prevent sensitive info in the URL from being transmitted to an untrusted site. Encoding sensitive information in a URL is pretty brain-dead. Isn't this also a failure of the site designer? So we're working around one class of mistake but refusing to accomodate another, and the end result is a browser that is less useful to the end user on today's Web. I know that mass popularity is not the end-all goal of the Mozilla team. But if you don't achieve some sort of critical mass, MS will continue to drive the de facto standards of how sites are constructed, and Mozilla will always play catch-up. I love Mozilla passionately and evangelize at every opportunity. But the reality is that even I have to keep MSIE on standby. Most of the time, I need it because some Frontpage idiot can't design with an eye toward standards. In those cases, I either skip over the site entirely or begrudgingly open IE. But in this case, I find it more difficult to blame the site owners when the referrer behavior of major browsers has been consistent for the past 5-6 years. Suggestion: I know Mozilla needs to be secure out of the box. But if you implement a "fix" for this "bug", I feel that a checkbox is not enough; Mozilla needs to send the referrer on HTTPS _out of the box_. Otherwise, it will never gain mainstream acceptance. Believe me, if you saw the authorize.net error message, you'd never think that there was a browser setting you could adjust to correct the problem. Joe User would just say "Mozilla sucks" and go back to IE. How about a baseline security policy that is "mostly secure"; at install time, the power user could check something that would adjust the overall policy toward "manic paranoid", locking down anything and everything (including referrer on HTTPS, Javascript popups, etc). Just a thought.
I have to agree with Jason Priebe above. There are countless sites that are using Referrer checks as part of a normal security/sanity/fraud check. GeoTrust's customer list is in the many thousands right now. The discussion about Webmail is an interesting one, but sure sounds like you are trying to invent a problem for the current "solution". Ask yourself two things; 1) How many webmail sites use HTTPS? AND 2) How many of those webmail sites encode the password in a GET query string. Are there any? Certainly none of the ones I am familiar with do(EXs: Yahoo, Hotmail, Outlook Web Access). Since almost all webmail systems use HTTP, if they simply encoded your username/password in the GET query string this bug doesn't add any security anyway.
benb: I forgot about <img>. hmm.... Any site using the referer as a security check is broken, since its trivially forged. Using it as a sanity check is only slightly less broken, because people may choose not to send it for privacy/etc reasons. (Using it as a sanity check to reject incorrect, as opposed to non-existant, referers may be more useful, although that can again be set by the user) Using it in combination with other things (ie username/password) doesn't make it less broken, since you then have an extra layer of authentication making the referer stuff almost useless. _However_, there are sites which care about this, and since the spec doens't forbit us to do this, and a large % of users have browsers (including ns4) which do so, and there are sites which rely on it, no matter how broken they may be.... Can we just strip off the query paramaters? That would get rid of most potnetially sensitive info. People who code sensitive stuff into the path (making it work via server side support of some sort) are likely to be rare. I dunno - thoughts?
A site checking the referrer as a security check is not "broken". How else are webmasters supposed to prevent the mass stealing of their content and bandwidth by other sites? The answer for the last 10 years has been they simply check the referrer to make sure it is one of thier own servers making the request. It isn't trivial to hack every end user's client browser to pass a specific referrer when calling a particular url. In fact I think that would be very difficult. If you could hack the client's browser, you could do a lot more harm than sending a bogus referrer. My situation is an extension of the above. We host thousands of images using one image tag. We use the referrer to figure out which image to send. If we don't get a referrer, we send an empty image.
Well, its 'broken' in that people can and do disable referer strings. Personally, I don't, but there are those that do, so.... Note that what you're doing is not 'security' in the sense that I was using the word. I meant that relying on the referer to make sure that someone only visits your page from the login page, or has completed part 1 of the form before part 2, or something like that, is silly, and broken. You're trying to protect yourself against a malicious thrid-party page, but an uncaring user, rather than a malicious user, which is a different situation. Anyway, I'm still leaning towards opening this up, both because the spec doesn't forbid it, and for 4xp/iecompat reasons. Darin pointed out to me that this is actually a pref ATM, so we'd just be swapping the default value. (BTW, Bug 89995 was the other bug I was refering to earlier, where this check was *way* too strict.)
Attached patch v1 patch (deleted) — Splinter Review
ok, here's the patch to enable cross-site HTTPS referrers. i also thru in a minor perf tweak suggested by bbaetz.
Keywords: nsbeta1nsbeta1+
Comment on attachment 99018 [details] [diff] [review] v1 patch >+// This pref controls whether or not we send HTTPS referrers >+// cross domain. By default, this is enabled for compatibility >+// with other browsers and many websites (see bug 141641). I'd prefer the comment be more explicit that both hosts are HTTPS so that "cross domain" isn't misinterpreted as https->http // Controls whether we send HTTPS referres to other HTTPS sites. // By default this is enabled for compatibility (see bug 141641) sr=dveditz
Attachment #99018 - Flags: superreview+
dveditz: yeah, that's much clearer.. thx!
Comment on attachment 99018 [details] [diff] [review] v1 patch This treats all HTTPS servers as equally trusted WRT referrees, which seems absurd, but I recognize the compatibility issues here and I think the actual risk is small. Ditto on adding a more explicit comment. Other than that, r=mstoltz.
Attachment #99018 - Flags: review+
fixed-on-trunk
Status: ASSIGNED → RESOLVED
Closed: 22 years ago
Keywords: mozilla1.0.2
Resolution: --- → FIXED
Comment on attachment 99018 [details] [diff] [review] v1 patch a=rjesup@wgate.com for 1.0 branch. Change mozilla1.0.2+ to fixed1.0.2 when checked in
Attachment #99018 - Flags: approval+
hello, wrt comments #41 and #42: stripping of the query string can easily be worked around using path info. when I had my https-/referrer problem, I solved it this way. leaves as much information as before to be shipped in the referrer... wrt mass stealing of content: in theory, not accounting for server load and application complexity, using time stamped urls for your images could prevent most bogus image requests since the urls time out after a while (just like time stamped email addresses which bounce after their time out period).
This is needed by a major bank customer in Japan. CC'ing jaimejr and buckland. Please make sure that this will be in the next NS release.
tever: pls verify this as fixed on the trunk. thanks!
Keywords: adt1.0.2
Whiteboard: [adt2] [ETA 09/18]
This is what I am seeing: Referers passed from HTTPS to HTTPS (original problem now working) " " " HTTP to HTTP " " " HTTP to HTTPS NOT passing Referers from HTTPS to HTTP which from my understanding is how it is supposed to work. internal tests at http://bubblegum/tever/refererSSLb.html and http://bubblegum/tever/refererSSLa.html. verified trunk - 09/18/02 builds - winNT4, linux rh6, mac osX
Status: RESOLVED → VERIFIED
Adding a dependency to bug 150046, as it is needed by a major embedding customer in the JA market.
Blocks: 150046
In and email I asked Kat if fixing this bug was both necessary AND suffient to get Mitsui-Sumitomo to support us. I interpret the answer below to mean that if we fix this bug all known blocks to their support are cleared. Kat wrote: We have word from Japan that this is the blocking issue and they have no other issue currently. We want this for getting Mitsui-Sumitomo to support us. This is a vital step in our overall plan to get top 24 banks to support us. If the committee needs to talk to me about this, I will be happy to bring any info you need.
adt1.0.2+, already has drivers approval -- please land on the 1.0 branch.
Keywords: adt1.0.2adt1.0.2+
fixed1.0.2
tever: can you pls verify this as fixed in tomorrow's 1.0 branch builds? thanks!
Blocks: blackbird
verified1.0.2 - 09/24/02 builds - winNT4, Linux rh6, mac osX
No longer blocks: 150046
ver 0.8.13 the extension conflicts with a plugin of this page. so error message open continuously. even if it is off, error causes. http://sejin90.tistory.com/227
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: