0
0
mirror of https://codeberg.org/crimeflare/cloudflare-tor synced 2024-12-22 23:50:31 +00:00

Update 'tool/block_cloudflare_mitm_fx/src/setwhitelist.html'

This commit is contained in:
legens 2020-12-05 01:27:59 +01:00
parent 7efc32f0da
commit 4f1cd0ac11

View File

@ -1,26 +1,35 @@
<html><head><meta charset="utf-8"><link rel="stylesheet" href="style.css"></head><body><form>
[Whitelist]<br>
1. Add FQDN or .FQDN you want to ignore. Click "Save".<br>
2. Open new tab and visit whitelisted website.<br>
<small>(<i><b>.</b>mozilla.org</i> will allow <i>mozilla.org</i> and <i>*.mozilla.org</i>)</small><br>
<textarea cols="50" rows="12" id="myset_cfwhite" wrap="off"></textarea><br>
<label><input type="checkbox" id="myset_xautoclean"> Auto-remove whitelisted domain if it is no longer use MITM services</label><br><small>(Add-on will notify you)</small><br>
<br>
[Advanced]<br>
<label><input type="checkbox" id="myset_xign3p"> Ignore 3rd party resource (not recommend)</label><br>
<label><input type="checkbox" id="myset_xwhitemark"> Change whitelisted website's title, favicon, and website border</label><br>
<label><input type="checkbox" checked disabled> I don't like Man-in-the-middle attack.</label><br><!-- justajokedonttakethisseriouslyLOL //-->
<br>
Also detect:<br>
<label><input type="checkbox" id="myset_xincapsula"> Incapsula MiTM</label><br>
<label><input type="checkbox" id="myset_xgshield"> Google's Project Shield MiTM</label><br>
<label><input type="checkbox" id="myset_xsucuri"> Sucuri MiTM</label><br>
<br>
When MiTM attempt is detected:<br>
<label><input type="radio" name="acttype" id="myset_xsimplewarn_0" value="0"> Show security warning page</label><br>
<label><input type="radio" name="acttype" id="myset_xsimplewarn_1" value="1"> Just change title, favicon, and website border</label><br>
<label><input type="radio" name="acttype" id="myset_xsimplewarn_2" value="2"> Cancel request immediately</label><br>
<br>
<input type="submit" value=" Save ">
</form><script src="setwhitelist.js"></script>
</body></html>
<html>
<head>
<meta charset="utf-8">
<link rel="stylesheet" href="style.css">
</head>
<body>
<form>
[Whitelist]<br>
1. Add FQDN or .FQDN you want to ignore. Click "Save".<br>
2. Open new tab and visit whitelisted website.<br>
<small>(<i><b>.</b>mozilla.org</i> will allow <i>mozilla.org</i> and <i>*.mozilla.org</i>)</small><br>
<textarea cols="50" rows="12" id="myset_cfwhite" wrap="off"></textarea>
<br>
<label><input type="checkbox" id="myset_xautoclean"> Auto-remove whitelisted domain if it is no longer use MITM services</label><br><small>(Add-on will notify you)</small><br>
<br>
[Advanced]<br>
<label><input type="checkbox" id="myset_xign3p"> Ignore 3rd party resource (not recommend)</label><br>
<label><input type="checkbox" id="myset_xwhitemark"> Change whitelisted website's title, favicon, and website border</label><br>
<label><input type="checkbox" checked disabled> I don't like Man-in-the-middle attack.</label><br><!-- justajokedonttakethisseriouslyLOL //-->
<br>
Also detect:<br>
<label><input type="checkbox" id="myset_xincapsula"> Incapsula MiTM</label><br>
<label><input type="checkbox" id="myset_xgshield"> Google's Project Shield MiTM</label><br>
<label><input type="checkbox" id="myset_xsucuri"> Sucuri MiTM</label><br>
<br>
When MiTM attempt is detected:<br>
<label><input type="radio" name="acttype" id="myset_xsimplewarn_0" value="0"> Show security warning page</label><br>
<label><input type="radio" name="acttype" id="myset_xsimplewarn_1" value="1"> Just change title, favicon, and website border</label><br>
<label><input type="radio" name="acttype" id="myset_xsimplewarn_2" value="2"> Cancel request immediately</label><br>
<br>
<input type="submit" value=" Save ">
</form>
<script src="setwhitelist.js"></script>
</body>
</html>