GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Board fucked up with FireFox (https://gfy.com/showthread.php?t=428454)

Michael O 02-07-2005 05:19 PM

Board fucked up with FireFox
 
Canīt click the top threads because of the new RealityCash Ad :(

rollinOn20s 02-07-2005 05:21 PM

Is that what it is. Been having the same problem. How do you fix it?

pornstar2pac 02-07-2005 05:25 PM

there is a new microsoft update tomorrow.

Michael O 02-07-2005 05:26 PM

Quote:

Originally Posted by rollinOn20s
Is that what it is. Been having the same problem. How do you fix it?

IE I guess so I guess I will be back when they get rid of that annoying ad

sickkittens 02-07-2005 05:26 PM

Bummer. I'm not a fan of using IE anymore. :(

Googooly 02-07-2005 05:28 PM

Guys Listen!

Im using Avant Browser and I HAVE no problem at all!! just use avant instead of crapy firefox and ull be sorted :)

nico-t 02-07-2005 05:29 PM

yep got the same problem here... damn!

Lensman 02-07-2005 05:33 PM

Worked fine on our GFY Dev server with Firefox, but not with the real deal. We are disabling with Firefox until we find the fix.

quiet 02-07-2005 05:36 PM

board does not work on safari or ie for mac OS X.

i got to this thread by looking at the source code and then skipping the main page.

pornstar2pac 02-07-2005 05:36 PM

All Browsers But IE At Risk To New Spoofing Scheme Feb. 7, 2005
EMAIL THIS ARTICLE
PRINT THIS ARTICLE
DISCUSS THIS ARTICLE WRITE TO AN EDITOR
More Stories on:
Security
Viruses and Patches



A newly uncovered vulnerability in most browsers can allow hackers to spoof the URL displayed in the address bar and the SSL certificate.

TechWeb News



A newly uncovered vulnerability in most browsers can allow hackers to spoof the URL displayed in the address bar and the SSL certificate, a security firm warned Monday. The one exception? Microsoft's Internet Explorer.

Danish security company Secunia posted an alert describing the vulnerability -- which affects Mozilla, Firefox, Safari, Opera, and Konqueror -- as a "moderately critical" problem.

The vulnerability impacts every browser built atop the open-source Geko browser kernel -- nearly all except IE -- because of a flaw in handling International Domain Names (IDN). Hackers can register domain names with certain international characters that resemble other commonly-used characters, said Secunia, to spoof the address and trick the user into thinking they're at a legitimate site and/or it's secured by SSL.

Such spoofing vulnerabilities are typically exploited by phishers who try to dupe users into divulging financial information at bogus Web sites that resemble real-life banking, credit card, or retail sites.

The vulnerability has been confirmed in the latest version of Firefox, v. 1.0, as well as in Mozilla 1.7.5, Opera 7.54u1, Opera 7.54u2, Safari 1.2.4, Konqueror 3.2.2, and Netscape 7.2. Other editions of these browsers, however, may also be at risk, said Secunia, which posted an online test on its Web site.

Currently, none of the vendors have provided fixes for the flaw.

wdforty 02-07-2005 05:52 PM

I was wondering what was going on with the board..

Michael O 02-07-2005 05:55 PM

Now I have the same problem with IE :(

quiet 02-07-2005 05:57 PM

woohoo, working in safari now!

xsivforce 02-07-2005 05:58 PM

http://www.gofuckyourself.com/showthread.php?t=428471

jukeboxfrank 02-07-2005 06:12 PM

Quote:

Originally Posted by pornstar2pac
All Browsers But IE At Risk To New Spoofing Scheme Feb. 7, 2005
EMAIL THIS ARTICLE
PRINT THIS ARTICLE
DISCUSS THIS ARTICLE WRITE TO AN EDITOR
More Stories on:
Security
Viruses and Patches



A newly uncovered vulnerability in most browsers can allow hackers to spoof the URL displayed in the address bar and the SSL certificate.

TechWeb News



A newly uncovered vulnerability in most browsers can allow hackers to spoof the URL displayed in the address bar and the SSL certificate, a security firm warned Monday. The one exception? Microsoft's Internet Explorer.

Danish security company Secunia posted an alert describing the vulnerability -- which affects Mozilla, Firefox, Safari, Opera, and Konqueror -- as a "moderately critical" problem.

The vulnerability impacts every browser built atop the open-source Geko browser kernel -- nearly all except IE -- because of a flaw in handling International Domain Names (IDN). Hackers can register domain names with certain international characters that resemble other commonly-used characters, said Secunia, to spoof the address and trick the user into thinking they're at a legitimate site and/or it's secured by SSL.

Such spoofing vulnerabilities are typically exploited by phishers who try to dupe users into divulging financial information at bogus Web sites that resemble real-life banking, credit card, or retail sites.

The vulnerability has been confirmed in the latest version of Firefox, v. 1.0, as well as in Mozilla 1.7.5, Opera 7.54u1, Opera 7.54u2, Safari 1.2.4, Konqueror 3.2.2, and Netscape 7.2. Other editions of these browsers, however, may also be at risk, said Secunia, which posted an online test on its Web site.

Currently, none of the vendors have provided fixes for the flaw.

:1orglaugh :1orglaugh

pornstar2pac 02-07-2005 06:23 PM

Fuck it, I'm going back to using WebTV

xsivforce 02-07-2005 06:28 PM

Quote:

Originally Posted by pornstar2pac
Fuck it, I'm going back to using WebTV

Funniest Post Of The Day! :1orglaugh

MachineHead 02-07-2005 06:28 PM

Workaround for Firefox:

type about:config in your address bar and do the following:

You can disable IDN support in mozilla products by setting 'network.enableIDN'
to false. There is no workaround known for Opera or Safari.

xsivforce 02-07-2005 06:31 PM

Quote:

Originally Posted by MachineHead
Workaround for Firefox:

type about:config in your address bar and do the following:

You can disable IDN support in mozilla products by setting 'network.enableIDN'
to false.

Doesn't that reset each time you open the browser?

MachineHead 02-07-2005 06:36 PM

If you mean resets to default each time you open a browser, then no.

xsivforce 02-07-2005 06:37 PM

Quote:

Originally Posted by MachineHead
If you mean resets to default each time you open a browser, then no.

Thanks for the tip. :thumbsup

MachineHead 02-07-2005 06:41 PM

These are the guys that discovered it:

http://www.shmoo.com/idn/homograph.txt

jimmyf 02-07-2005 06:46 PM

Quote:

Originally Posted by MachineHead
Workaround for Firefox:

type about:config in your address bar and do the following:

You can disable IDN support in mozilla products by setting 'network.enableIDN'
to false. There is no workaround known for Opera or Safari.

thanks a bunch
:thumbsup

xsivforce 02-07-2005 07:12 PM

Quote:

To disable IDN as a workaround for this problem (on Gecko-based browsers): hit about:config and set network.enableIDN to false.

That is a great suggestion, except for the part where it does not work.

Go ahead, make the change, then restart your browser. Now go look at about:config again. Yup, still set to false. Now go see if it the setting worked. It does not. So at least with Firefox 1.0 just took a bad situation and made it worse. Now people will think turning off this setting will actually accompolish something and protect them and it will not.
http://it.slashdot.org/comments.pl?s...8&cid=11596841

MachineHead 02-07-2005 07:29 PM

Read a little further down on that Slashdot thread. You might have toggle it to True and then False again. It worked for me, but after reading the whole thread, I see it is not working for others.

xsivforce 02-07-2005 07:31 PM

Quote:

Originally Posted by MachineHead
Read a little further down on that Slashdot thread. You might have toggle it to True and then False again. It worked for me, but after reading the whole thread, I see it is not working for others.

Looks like some fixes are already in the works. I'll be keeping an eye for it.


All times are GMT -7. The time now is 11:15 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123