Chat: Make http:// URLs clickable#886
Conversation
|
Hmm. What is about the security issue? @atsampson, @ann0see, @gilgongo, @pljones What is your opinion on the security risk? |
|
If you allow https://, I don't really see a problem with http:// (But I'm not an expert on this). Since there's a message asking the user if he really wants to open <url>, I don't see a big security issue. |
|
I guess in so far as all security is a balance between utility and safety, we think the utility of having clickable links outweighs the possibly insecurity of clicking them. |
|
Given this was previously specifically decided against, I'd expect there to be an overriding argument presented before changing anything that addresses the security concerns, rather than just "it's not nice". |
|
https is supposed to help block (mitigate?) spoofing. In another thread, I was warned about jamulus.io.fakehost.com. My browsers default behavior is to block http. It is not a problem for me, but for the naive users I am onboarding, it would be good to eliminate the use of http. Fewer things to go wrong with naive users. |
|
@gene96817 It seems pretty (probably increasingly) unlikely that people will legitimately post links to non-SSL sites. Almost to the point that if they do, then that's a marker for illegitimacy now? |
It's a usability thing. I work with people who hardly know what a browser or what copy and paste is. They had someone else set up their machine and their Jamulus instance. For those people, it's way easier to have a clickable link. Would also be interesting to know what @AndyMcProducer's use case was (cf. #879). I fully agree that Regarding security, I think it would be important to understand what threat we are trying to mitigate:
The only security argument which remains is: "people should only be using authenticated and encrypted communication". I generally like this sentiment. However, applying this argument in this http/https discussion sounds a bit strange to me, considering that Jamulus is supposed to be an open ecosystem with no authentication or encryption builtin. Therefore, I do not see any specific security downsides with whitelisting |
|
For Jamulus, the main benefit of https is to ensure the user is connected to the site we intended. |
Previously, only https:// URLs were whitelisted as part of a security hardening to prevent problematic handlers such as file:// (jamulussoftware#314, jamulussoftware#360). This PR adds http:// to the whitelist. This is helpful as some resources are still not available using encrypted https:// connections. Fixes jamulussoftware#879. Signed-off-by: Christian Hoffmann <[email protected]>
e3351df to
e6610eb
Compare
|
I'd prefer it if Jamulus treated |
|
Thanks for all your comments! I'll merge it now. |
|
I'd have thought some where there would be a list of blacklisted sites or a way to check realtime. |
Previously, only https:// URLs were whitelisted as part of a security
hardening to prevent problematic handlers such as file:// (#314, #360).
This PR adds http:// to the whitelist. This is helpful as some resources
are still not available using encrypted https:// connections.
Fixes #879.