this post was submitted on 22 Jan 2024
101 points (99.0% liked)

Firefox

17938 readers
32 users here now

A place to discuss the news and latest developments on the open-source browser Firefox

founded 4 years ago
MODERATORS
 

This has started happening a while ago (previously there was not perceptible delay) and luckily I don't have to visit HTTP sites very often but it is annoying and I would like to get rid of it.

I know HTTP is bad TYVM. I only use this HTTPS-only mode to forcibly upgrade to HTTPS whenever possible and be notified if it doesn't work.

Does anyone know why this is happening and how to disable it?

#Firefox @firefox@lemmy.world

top 17 comments
sorted by: hot top controversial new old
[–] MangoPenguin@lemmy.blahaj.zone 30 points 10 months ago (2 children)

I wish the invalid SSL cert warning and the password field on HTTP warning could be permanently disabled for all private IP ranges. They are incredibly annoying.

[–] Peer@discuss.tchncs.de 7 points 10 months ago (2 children)

That would mean malware can use your local ip and hostfile for mitm attacks.

[–] xhduqetz@lemmy.ml 12 points 10 months ago

Isn't it already game over if malware can write into your hostfile? At least on Windows you need some elevated access for it, which means such malware could just read/write the target program's memory directly instead of resorting to clunky MitM.

[–] MangoPenguin@lemmy.blahaj.zone 5 points 10 months ago

If malware can write my hosts file it's probably all over anyways, it has admin access and just keylog everything and pull passwords directly from browsers.

I'm not saying it should be the default, I just want an about:config option to disable them (they used to have one for the insecure password field but it no longer works).

[–] max@feddit.nl 6 points 10 months ago

Pretty much the only place where I see them. Let’s hope we can disable it in the future.

[–] shortwavesurfer@lemmy.zip 20 points 10 months ago (1 children)

I have not seen that unless it's some sort of new feature, but if so, that will get quite annoying, quite fast as I access my server locally via HTTP with the IP address.

[–] DarkDarkHouse@lemmy.sdf.org 13 points 10 months ago (2 children)
[–] Atemu@lemmy.ml 20 points 10 months ago (1 children)

Pressing "Continue to HTTP Site" actually adds it to the allow-lists already which is quite handy (if it weren't for the annoying delay now...)

[–] lemming@sh.itjust.works 1 points 10 months ago

And can I turn this off?

[–] shortwavesurfer@lemmy.zip 5 points 10 months ago

I wonder if there's a way to do that on mobile.

[–] lemann@lemmy.dbzer0.com 13 points 10 months ago* (last edited 10 months ago) (1 children)

I don't believe you can get rid of that screen, or the newly added delay, if you have firefox set to HTTPS Only mode

Looking at the support site, the only exceptions that seem to exist there are on a per-site basis: https://support.mozilla.org/en-US/kb/https-only-prefs

You could try poking around in the about:config I guess just in case it hasn't been documented yet.

Edit: added link and extra info

[–] Atemu@lemmy.ml 16 points 10 months ago

Note that I only want to get rid of the delay before being allowed to press the button, not the screen itself. I want an HTTP connection to remain an action I must explicitly initiate (as it should be).

[–] gencha@lemm.ee 12 points 10 months ago (1 children)

Does security.dialog_enable_delay work on that?

[–] Atemu@lemmy.ml 8 points 10 months ago (1 children)

It does not. It's also 5s, not 1s, so that couldn't have been it.

Btw, Googling that option, I found out that there's a reason for this delay and it's security: https://www.squarefree.com/2004/07/01/race-conditions-in-security-dialogs/

[–] mjurgens@discuss.tchncs.de 4 points 10 months ago* (last edited 10 months ago) (1 children)

That timeout should indeed only last the value of security.dialog_enable_delay, so 1s. If it is 5s for you, it would be nice if you write a bug report, maybe with a screen recording.

[–] Atemu@lemmy.ml 3 points 10 months ago

Huh, after a restart it appears to honour that setting; it's now 1s and that's an acceptable security trade-off.

I'm not 100% sure but there may have been an update that was applied by the restart.

[–] lud@lemm.ee 5 points 10 months ago

I also noticed that and I assume it's because they want people to actually read the warning and not just click continue without thinking.