-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
clarification regarding mitm attack #8
Comments
Well. Sure, that makes sense. That can be considered a vulnerability, in theory, but it is one that cannot be exploited reliably, because this extension only handles HTTP requests. This guy/gal spared me some explaining on that. For example, say you visit As you see, it is not much of a risk, but it is a risk inherent to the way the extension works, and one I can at least help minimize even more. I'll hopefully do a beta release soon. PS: I purposely ignored the fact that when you're being MitM'd by someone with the means to exploit that vulnerability, you have much more dangerous shit to be worrying about. |
Actually, my example above is kinda wrong in that the page action will still be displayed as long as you click the link after no more than two minutes have passed since |
- Fix onErrorOccurred HTTPS listener check (#10) - Implement whitelist UI in options menu. Items added to the whitelist from an incognito window will not get listed. Closes #5 - Fix minor issues with pageAction. Shouldn't be displayed on server redirection from http to https when the site is whitelisted and such - Implement option to remember secure sites + options page improvements (related to #8)
- Fix onErrorOccurred HTTPS listener check (#10) - Implement whitelist UI in options menu. Items added to the whitelist from an incognito window will not get listed. Closes #5 - Fix minor issues with pageAction. Shouldn't be displayed on server redirection from http to https when the site is whitelisted and such - Implement option to remember secure sites + options page improvements (related to #8)
|
thanks for your explanation and work claus - i would've commented sooner but i totally forgot i was the one that created the issue :) your explanation indicates something i should already know, but apparently don't - that apparently there is no way to authenticate that the browser is talking only to who it's supposed to be talking to? the answer seems to be a resounding 'NO', else MITM attacks wouldn't be a thing
not only does that sound logical, but i would posit that anyone silly enough to do business over an unsecured connection has more shit to worry about |
There are some ways, but nothing is bullet proof. HTTPS is in part there for that... as long as certificates can't be spoofed you're safe to assume your browser is talking to whoever it's meant to be talking. Then there are CDNs that site owners give their private keys to, basically trading their users' privacy and security for their own convenience (basically shitting on the whole concept of authentication and allowing those intermediaries to read the communication in plain text), and shit like that. Firefox has a bunch of built-in protections against various MitM and phishing attacks, too, but it can't deal with the vast myriad of different attacks on its own in the end.
Absolutely. As it happens with almost everything related to privacy and security, the biggest risk factor is sitting right behind the keyboard. Anyway, thanks for letting me know of this and also for recommending this extension :) |
Nice work on HTTPZ - and thanks for recommending Temporary Containers. :) Just a quick thought that came to mind while reading this: the web is moving to https-only anyway (let's encrypt, googles downranking of http sites, chrome planning to introduce https-first); how about letting HTTPZ show a warning-page (possible MITM ahead!) when downgrading to HTTP and let the user confirm before proceeding? (Like the certificate warning, just the other way around, heh) |
Hey, that means a lot coming from you! 😸
Ah yes. I had the same idea the other day, but ended adding this option to remember secure sites, because it is simpler to implement and less obtrusive for the end user. I may eventually add that as an option, though. Anyway, good to have you around! |
...after showing a warning. Related to #8
Just FYI, |
...after showing a warning. Related to #8
this was brought up on the privacytools.io repo and i'm wondering if you could provide some insight claustro - thanks! ...
The text was updated successfully, but these errors were encountered: