browser – Best way to suggest enabling cross-site cookies with Brave

For technical reasons (OIDC library uses CORS requests to renew API access tokens), our application requires that when using the Brave browser, the security shields built into Brave be either disabled or cross-site cookies enabled.

Any ideas or suggestions on the best way to inform the user of this?

During the login process, we could just have some italic text for this, but would be easily ignored.

I was envisioning perhaps having the Brave logo somewhere in the app, perhaps in the footer with a tooltip / overlay and a popup on click that clarified that the authentication session will not renew past 6 minutes without cross-site cookies enabled and a description of how to enable this.

Any other ideas or thoughts on the best ways to convey this to our users as painlessly as possible?

Thanks, really appreciate any and all suggestions!

Clear Browser Cache of Certificates Used for Authentication

We are using cert based authentication where the client sends a cert to the server, which is validated for authentication for a web application. This all works well. The problem happens when the user attempts to logs out. The browser seems to hold on to the cert and the user is immediately re-authenticated. We have tried closing the browser and reopening it, but it hasn’t helped. We see this behavior on Chrome and Firefox alike.

Is it possible to clear the cert cache?

why textarea does not work in the chrome browser

I use drupal 8.5 with webform 8.5.12
Direction, ecpace and tab keys do not work in with chrome browser
Could you help me please?

How to force OpenSSL to use same certificate-chain validation algorithm used by Chrome Browser and SSL LABS

Question: How can I force OpenSSL to use the same certificate validation algorithm used by the Chrome Browser and SSL Labs?

Details:

The certificate chain sent by “adswizz.com” includes a recently expired certificate from COMODO (expired May 30, 2020).

This OpenSSL command uses a simple algorithm that walks the cert-chain provided by the server, finds the expired certificate, and then reports “Verify return code: 10 (certificate has expired)”.

openssl s_client -showcerts -connect adswizz.com:443 -servername adswizz.com < /dev/null

In contrast, visiting this SSL Labs URL shows the results from a more sophisticated algorithm that explores several different paths attempting to validate the server certificate.

https://www.ssllabs.com/ssltest/analyze.html?d=adswizz.com

This finds 3 possible paths (see image below). Path #2 is the same path used by OpenSSL, so it fails due to the expired certificate, … but Paths #1 and #3 both succeed. (Path #3 even downloads an additional certicate!)

We want to use openssl from the Linux command line, and use the glib-openssl library to support TLS communication with the server. What command-line options or library config settings can we use to force OpenSSL to validate a certificate and get the same result as the Chrome Browser.

We cannot force the 3rd party running the adswizz.com to update its certificate chain because they will “check” using Chrome and tell is, “Looks valid”, … but OpenSSL will still fail.

We need a fix or a workaround. Any ideas?

Any help would be appreciated.

# openssl s_client -showcerts -connect adswizz.com:443 -servername adswizz.com < /dev/null

CONNECTED(00000003)
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root
verify error:num=10:certificate has expired
notAfter=May 30 10:48:38 2020 GMT
---
Certificate chain
 0 s:/OU=Domain Control Validated/OU=PositiveSSL Wildcard/CN=*.adswizz.com
   i:/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo RSA Domain Validation Secure Server CA
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo RSA Domain Validation Secure Server CA
   i:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 2 s:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/OU=Domain Control Validated/OU=PositiveSSL Wildcard/CN=*.adswizz.com
issuer=/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo RSA Domain Validation Secure Server CA
---
No client certificate CA names sent
Peer signing digest: SHA512
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 5334 bytes and written 454 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-GCM-SHA384
    Session-ID: B56072247A34ED804A1B84933F673D5029E02352C1EC96109F38991BCE1DA450
    Session-ID-ctx: 
    Master-Key: 79A358537CE41E0CA4D3463848A9837397BB06B068547F702336723D42BB7DB0A788390E76F4264534D2B47EE2B1B48C
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 300 (seconds)
    TLS session ticket:
    0000 - 60 bb 34 9c c4 9e 1e d5-25 30 51 e8 c0 66 ad f9   `.4.....%0Q..f..
    0010 - 96 ff 5a 60 3b 9b 50 07-55 08 2b 11 5e 72 9e fb   ..Z`;.P.U.+.^r..
    0020 - b6 47 85 f1 42 27 28 ae-ce fc e0 63 c3 00 60 01   .G..B'(....c..`.
    0030 - 78 d0 6b c6 d9 40 8e 5d-96 14 a0 24 f2 4e 35 25   x.k..@.)...$.N5%
    0040 - 3e e4 94 21 c6 11 0b db-00 6b c7 16 87 c1 92 a2   >..!.....k......
    0050 - 9a c3 dc 51 95 5d 44 6f-e0 f0 20 2c 44 9e 07 e3   ...Q.)Do.. ,D...
    0060 - cb 0a 83 f2 8f 06 d8 9d-53 b8 85 a1 62 27 09 dd   ........S...b'..
    0070 - a2 74 35 31 07 71 5b 92-87 8e 84 34 c4 10 9f 01   .t51.q(....4....
    0080 - 0a 86 30 32 e4 b2 3e ed-3c c4 81 49 42 60 19 9b   ..02..>.<..IB`..
    0090 - ff 90 0b 0a a7 4b 58 ed-bd b9 6a 8a 09 3e 54 0e   .....KX...j..>T.
    00a0 - 39 ce 19 14 fb 5d b3 b6-11 a3 11 da 53 11 ff 06   9....)......S...
    00b0 - 0e 9c 1b 7f 14 ef 69 cb-35 5a 79 29 dd ed 9c 39   ......i.5Zy)...9
    00c0 - 19 e2 6a 9e d7 06 5e e7-3b 86 c1 0e cb 80 7e 6a   ..j...^.;.....~j

    Start Time: 1591065727
    Timeout   : 300 (sec)
    Verify return code: 10 (certificate has expired)
---
DONE

enter image description here

finder – How to save a pdf file in a browser window without downloading it again?

Typically on my Macbook Pro, I click on URLs to pdf documents and they open in a browser window (say, Safari or Chrome), and later if I wish to keep a copy of the pdf file, I click the down arrow icon.

However, the down arrow icon actually attempts to fetch the pdf file from the server again, whereas I already have a local copy in a browser cache somewhere. So, it is an inefficient use of bandwidth. Furthermore, sometimes the original file may no longer be available at the server, or I may not be having Internet access, etc., and I want to save a copy of the file.

Do I need to go searching for the file in the browser cache somehow? Or is there a more convenient way?

Is it good UX to prompt users before closing the browser window on mobile

i’m designing a mobile web based e-commerce solution. If the user closes the browser window, items in their cart will be lost (assuming they rejected the initial cookie request) when they return. To prevent this i’m considering prompting the user if they are sure they want to close the browser and would like to create an account . Is this a good way to overcome this issue or is there another way?

Do users know what “browse” and/or “browser” mean?

Personally I would understand the intention regardless of which wording you choose, then again I consider myself a more technical user. So let’s look at it from a non-technical point of view, which is who you are trying to reach out to here.

I think the word “browse” can be misleading as it could be interpreted as the action of looking through a collection of something. It certainly does not suggest the action of uploading files. So no, I don’t think you can rely on users knowing what “browse” means.

It is better to be more specific about the action that the user is expected to perform, and that is that they need to upload some files.

  • The button should say “Upload Files” or “Choose Files to Upload”
  • The browser element would benefit from the message “Select one or more files to upload” as a reminder, if possible
  • The browser element should have a confirm button that says “Upload Selected Files”

Any user that struggles with this was probably going to end up needing support to do it anyway.

I think the main point here is: there is no benefit to using “browse” over “upload”, where as there is a benefit to using “upload” over “browse” (i.e. the intent is more clear). So you’re not going to be any worse off by dropping “browse”.

browser – “‘IDBIndex’ is not defined” in Edge Private window with VUE, Firebase

I am facing a very weird issue and I don’t know what is the root cause or how to investigate it further.

I created a simple website with VUE, initialized Firebase with firebase init, using Firestore to read/write some data, and using Cloud Functions for some background work.
That is all my site is doing. So far I’ve been testing on Firefox and everything was working fine. Today I tested on Edge and I noticed a very weird issue.

The site doesn’t display anything in Edge private window although its working fine in a non-private Edge window.

I am aware of inconsistencies across browsers, but I’ve never seen inconsistencies between private and non-private instances of the same browser.

I checked the console and noticed an error in the private window: ‘IDBIndex’ is not defined. I didn’t see this error in the non-private window.

Question:
What could be the possible reason for this inconsistent behavior between private/non-private window of the same browser?
How should I investigate/fix this?

Image1: Console on the non-private window, no error
Image1: Console on the non-private window, no error

Image2: Console on the Private window, error: ‘IDBIndex’ is not defined
Image2: Console on the Private window, error: 'IDBIndex' is not defined

Looking for internet-connected desktop app developers to create Chinese language Internet browser

Hi all,

This is for a future project,
SEMrush

I’m also looking for people who know how to build their own internet browser (basically internet-connected desktop apps, that can be installed, with address bar) but not using the existing www, .com, .net system but our own new one that is multi-language, but for the start I’ll focus on both simplified and traditional chinese.

e.g.

Instead of .com

I want it to be
【网#讨论】
【亚洲#讨论】
【美国#谷歌】
【日本#节目网站】

e.g.
【(cctld)#(domain)】

New system. Thanks.

I expect that the browser open, will also show a default website. I’ll be the one creating the default website. The default website will still use .com system etc, but my browser must not show this .com, but the new special address. New search engine.
The new “domain name” system will also be a database etc.

Thanks

 

web browser – Is there some method to track what changes to files a website does?

So I was trying to find out how this site pentest-tools tracks me without normal MAC address or even IP address. This website basically gives us 2 “free scans” allowing us to scan any 2 sites and find some of the basic vulnerabilities present in websites.

So there are plenty of websites out there (actually, only 2) that provide this free “scans” for basic vulnerabilities. So as a challenge, I wanted to find out whether I could fool the website into allowing me more than 2 scans by changing my identity thus having the server think of me as a new user.

So, I tried all the basic methods of hiding my identity (BTW I am not a hacker or anywhere near) which included MAC and IP spoofing and cookies clearing. But they didn’t work. So, I had a few questions:-

  1. Is there any way to track what file changes the site performs to identify me so that I can find those cookies responsible for storing the number of scans I have used and delete them?

  2. Also, would there be any program that immediately removes whatever files generated by the website (tracker by the above method) and placed on the computer files be deleted automatically? something which even prevents supercookies?

TIA

Regards,
Neel Gupta