Closed
Bug 31510
Opened 25 years ago
Closed 22 years ago
Proxy: localhost and 127.0.0.1 should be proxyable, but not by default
Categories
(Core :: Networking, defect, P3)
Tracking
()
VERIFIED
FIXED
mozilla1.2beta
People
(Reporter: bbaetz, Assigned: benc)
References
Details
Attachments
(2 files, 1 obsolete file)
(deleted),
patch
|
Details | Diff | Splinter Review | |
(deleted),
patch
|
dougt
:
review+
darin.moz
:
superreview+
|
Details | Diff | Splinter Review |
I've been trying out PSM with the latest CVS build.
Clicking on the padlock icon doesn't work because it tries to connect to
http://3@127.0.0.1:someport but this gives me a connection refused error from
the proxy.
I'm using manual proxies since autoproxy doesn't work yet, and didn't have
localhost,127.0.0.1 listed in the "No proxies for" section. Once I add this,
then it works fine.
I've checked that trying http://{localhost,127.0.0.1} tries to go through the
proxy, so its not a PSM problem.
This could be resolved as user error, but if PSM relies on this then I think it
should be the default.
Comment 2•25 years ago
|
||
As far as localhost going through a proxy - I think it should. Netscape 4.X does
this, and if I have my proxy on localhost and/or properly set up then I *want*
localhost to go through the proxy server - especially if I'm using it as some
sort or debugging tool. So, I think this portion of the bug is wontfix or
invalid, which I think the reporter already new - but was just pointing out to
show what is causing problems with the PSM stuff. :)
As far as the PSM stuff going through the proxy - yeah, bad!
marking a duplicate of bug 31164.
*** This bug has been marked as a duplicate of 31164 ***
Status: UNCONFIRMED → RESOLVED
Closed: 25 years ago
Resolution: --- → DUPLICATE
+qawanted - need to verify behavior in something recent link M0.9.
change summary for searchability.
The duped bug isn't really a dupe.
Joe's point is very good, send everything to the proxy, and use "no proxy" if
you do not want it to.
If "no proxy" has bugs (and it does), comment here and we'll mark a depends.
Status: VERIFIED → UNCONFIRMED
Keywords: qawanted
Resolution: DUPLICATE → ---
Summary: localhost and 127.0.0.1 should not go through the proxy → Proxy: localhost and 127.0.0.1 should be proxyable
qa to me.
-> new
Status: UNCONFIRMED → NEW
Ever confirmed: true
QA Contact: tever → benc
Bug 80848, might make it so you cannot get out of proxying "localhost".
Comment 7•24 years ago
|
||
Well, I filed this originally, but I can't remember what I was thinking :) It
was mainly PSM bug IIRC - I shouldn't have had to avoid proxying to localhost if
I wasn't expecting to connect there.
A current branch build does allow localhost to be proxied.
+mostfreq <wow, this is really annoying people...>
Keywords: mostfreq
Assignee | ||
Comment 10•23 years ago
|
||
*** Bug 86449 has been marked as a duplicate of this bug. ***
Comment 11•23 years ago
|
||
I don't see how you can make them proxyable - what if your proxy is on another
server ? IMHO, there should simply be a default entry in 'No proxy for' of
127.0.0.1, localhost. Then if people *really* want to use a proxy for that
address they can just delete it.
Comment 12•23 years ago
|
||
Bugs targeted at mozilla1.0 without the mozilla1.0 keyword moved to mozilla1.0.1
(you can query for this string to delete spam or retrieve the list of bugs I've
moved)
Target Milestone: mozilla1.0 → mozilla1.0.1
Comment 13•23 years ago
|
||
localhost,127.0.0.1 should by default be in the "No Proxy For" field.
This is what most people want, and can be easily changed by the minority.
Assignee | ||
Comment 14•23 years ago
|
||
I think gabriel came up with this idea first, about chaning the defaults.
I've been meaning to make this as my first attempt to patch, but if anyone wants
to do it, go ahead.
I think the idea would be to add the following line to all.js:
pref("network.proxy.no_proxies_on", "localhost, 127.0.0.1");
Since this is a prefs change, I think this could be done anytime, even for 0.9.7
if someone could come up with a really good reason...
Comment 15•23 years ago
|
||
IE has a checkbox 'do not use proxy server for local addresses', by default
unchecked.
I think putting localhost,127.0.0.1 on do not use proxy for is a better solution.
Assignee | ||
Comment 16•23 years ago
|
||
owner->me.
I've tested a bunch of combinations of no-proxy so that I know I've got the
correct configuration.
And I think I'm making enough progress getting CVS access, installing compilers
and other build/patch stuff where I will actually be able to build the patch and
submit it soon.
Officially, it would be good for someone to volunteer to qa the change as well...
Assignee: gagan → benc
Comment 17•23 years ago
|
||
*** Bug 130296 has been marked as a duplicate of this bug. ***
Comment 18•23 years ago
|
||
*** Bug 145876 has been marked as a duplicate of this bug. ***
Comment 19•22 years ago
|
||
*** Bug 164532 has been marked as a duplicate of this bug. ***
Comment 20•22 years ago
|
||
*** Bug 164802 has been marked as a duplicate of this bug. ***
Comment 21•22 years ago
|
||
I know this is not the place to start a discussion on this item but I just
wanted to add the following :
127.0.0.1 is the loopback address, meant for local (same host) access.
'localhost' is a dns entry with is by RFC bound to 127.0.0.1, the loopback
address.
The number of people who intend to use address through a proxy is imho very
small. But the possibility should exist.
'Correct' behaviour would imho be :
As soon as a user enters a proxy/choose auto proxy, 127.0.0.1 should be added
as a default in the 'no proxy for' so it can still be deleted.
'localhost' should not be added as it is bound to 127.0.0.1 by default.
<i>The ".localhost" TLD has traditionally been statically defined in host DNS
implementations as having an A record pointing to the loop back IP address and
is reserved for such use. Any other use would conflict with widely deployed
code which assumes this use. </i>
Of course overriding this can still be done on OS level.
I would even go as far as to copy the proxy-ip for all entries when the manual
HTTP proxy is entered; from a user friendly use point of view
Assignee | ||
Comment 22•22 years ago
|
||
localhost has to be included in the fix because we don't do hostname -> IP
conversion when we use the "no proxy" mask, we do a string compare. There is a
bug on this somewhere...
Assignee | ||
Comment 23•22 years ago
|
||
I've tested this patch to make sure it changes http://localhost and
http://127.0.0.1
Assignee | ||
Comment 24•22 years ago
|
||
Okay, I've checked all the dupes, moved the correct ones to Networoking,
verified them all, fixed a couple bad dupes...
Due to limitations in "no proxy for", it might trap http://localhost.fqdn.com or
other hostnames w/ localhost in it.
I also need to check how well manual over-ride works.
Assignee | ||
Comment 25•22 years ago
|
||
Okay, patched phoenix's file. oops. I'll patch the other file soon.
Turns out the behavior is this:
new profiles will show the values by default.
However, if you delete them, they will be replaced by "", and that entry in
prefs.js will never clear, so it is basically a one time seed.
Assignee | ||
Comment 26•22 years ago
|
||
Assignee | ||
Comment 27•22 years ago
|
||
Comment on attachment 101381 [details] [diff] [review]
patch for the mozilla-trunk all.js
that's not a patch!
Attachment #101381 -
Attachment is obsolete: true
Assignee | ||
Comment 28•22 years ago
|
||
Comment 29•22 years ago
|
||
Comment on attachment 101383 [details] [diff] [review]
patch to all.js for mozilla-trunk
sr=darin
this seems like a reasonable stop-gap measure; although it will do nothing to
help out folks who have modified the no_proxies_on preference in their prefs.js
(via the proxy prefs UI).
ultimately, we need to move some checks into the nsProtocolProxyService to
always disable proxying to localhost. we might want to pref this check as
well.
also, there's some edge cases that this check will miss. e.g. "xyzlocalhost"
Attachment #101383 -
Flags: superreview+
Summary: Proxy: localhost and 127.0.0.1 should be proxyable → Proxy: localhost and 127.0.0.1 should be proxyable, but not by default
Comment 30•22 years ago
|
||
Comment on attachment 101383 [details] [diff] [review]
patch to all.js for mozilla-trunk
r=dougt
Attachment #101383 -
Flags: review+
Assignee | ||
Comment 31•22 years ago
|
||
Thanks. I don't have cvs checkin for code, only mozilla.org. Is the next step
finding someone to cvs checkin to the trunk?
Comment 32•22 years ago
|
||
I know this is late but I object to including "localhost". It is just a
string. By convention it is the name for 127.0.0.1 but that's just a
convention. There's no RFC that requires that linkage. In fact, some
installations handle "localhost" in their DNS servers wher it could refer to
almost anything. This patch is based on what works on some machines not what
is required for all machines.
Assignee | ||
Comment 33•22 years ago
|
||
Every DNS server that has "localhost.domain.com" that I have checked maps back
to 127.0.0.1.
The underlying problem here is that noproxy just checks the URL string, so there
is no "check the IP post DNS resolution" step. If you don't trap "localhost",
you never will.
Assignee | ||
Comment 34•22 years ago
|
||
RESOLVED/FIXED:
thanks to sicking for the checkin!
This should be in the trunk before the 1.2 branch, so new profiles in 1.2b and
1.2 should exhibit this as well.
Assignee | ||
Comment 35•22 years ago
|
||
opps.
Status: NEW → RESOLVED
Closed: 25 years ago → 22 years ago
Resolution: --- → FIXED
Target Milestone: mozilla1.0.1 → mozilla1.2beta
Assignee | ||
Comment 36•22 years ago
|
||
VERIFIED/fixed:
Normally, I would not verify my own fix, but this was just a prefs file change.
Looked only at Mac OS X, creation of new profiles does have pre-populated "no
proxy" entries.
Status: RESOLVED → VERIFIED
Keywords: qawanted
Assignee | ||
Comment 37•22 years ago
|
||
Phoenix got this change thanks to blake:
http://bonsai.mozilla.org/cvsview2.cgi?diff_mode=context&whitespace_mode=show&file=all.js&branch=&root=/cvsroot&subdir=mozilla/browser/app/profile&command=DIFF_FRAMESET&rev1=1.9&rev2=1.10
Minotaur got this by copying the trunk file.
You need to log in
before you can comment on or make changes to this bug.
Description
•