https://bugzilla.mozilla.org/show_bug.cgi?id=1217162
Looks like that setting affects a contextual message that appears when
you select an input field for login credentials but the page is not
secured. However, I have to wonder if they also check if the form
submit points at an HTTPS page or just HTTP. I've seen many sites where
you visit an HTTP page for the login but the credentials are not sent
unencrypted. The form's submit action says where to submit the data and
that can point to an HTTPS page. So you see an HTTP page for login but
your credentials are transferred over an HTTPS connection to where the
form's submit points. It would be stupid and show incomplete experience
regarding login pages to not check to WHERE the login credentials are
sent, not just that the page presenting the input fields happens to not
be secured itself.
https://support.mozilla.org/t5/Firefox/Disable-quot-login-information-might-be-compromised-quot-warning/td-p/1374089
https://support.mozilla.org/t5/Protect-your-privacy/Insecure-password-warning-in-Firefox/ta-p/27861
That shows an screen capture showing the contextual (popup) warning that
appears for a login field in an HTTP page. Since this appears before
the user has even entered the string and before they have submitted the
string, it looks like they don't bother to check to WHERE the form data
gets submitted. So, on some sites, this warning is not only bogus but
misleading. They are only checking if the login fields are presented
when visiting a non-secure HTTP web page. I see nothing to indicate if
they decipher to *where* your login credentials actually get submitted.
Someone didn't think this through or they don't understand how forms
work in HTML pages. security.insecure_field_warning.contextual.enabled
is disabled (False) in my Firefox because it is not a valid indicator of
whether my login credentials will be *sent* via HTTP or HTTPS.
So the setting you mentioned is not about the address bar showing a red
slash through a padlock icon. Sites don't need to bother with HTTPS if
the content they deliver is public: it's there for everyone to see.
Perhaps the site doesn't care to prove the site you intended to visit is
the site where you landed. Go to
intel.com and you get the red slashed
padlock icon in the address bar. Instead of providing positive
notification that a page is secure, which is how it worked before and
how it works in other web browsers, Mozilla decided to change tracks and
provide negative notification that a page is insecure.
https://securingtomorrow.mcafee.com/business/safeguard-data/a-new-firefox-feature-will-help-you-keep-your-passwords-safe/
I would like to see Mozilla's statistics on how many users missed or
ignored checking for the green padlock in the address bar to verify they
did indeed visit a secured page. Instead of showing green locked for
secure and gray unlocked for insecure (which really is a single flag
showing only for secure), they now show both states and made it more
obvious when you are in the insecure state. They made it more
noticeable. I have not yet found a setting that reverts back to the
less noticable simple gray unlocked padlock when visiting HTTP sites.
Since is likely a GUI element change (a different icon replaces the old
one), I'm guessing it cannot be changed via setting. I don't use
customized style sheets to know if it could be altered that way.
http://news.thewindowsclub.com/firefox-to-warn-you-about-insecure-logins-88656/
That article says "web pages which collect passwords but don’t use HTTPS
will display a gray lock icon with a red strike-through in the address
bar of the Firefox browser." Not true. As mentioned, visit
intel.com.
You get the red slashed padlock. There is no login fields in that page.
Their signin uses a different page and that one does use HTTPS.
Yet, by default, Firefox allows mixed content (HTTP content delivered by
an HTTPS page) for images while blocking mixed content for data. They
think that images cannot reveal sensitive information, like a bank
putting an overlay on an image showing your bank account number would be
impossible or a thumbnail gets sent showing a summary of your account
transactions. So they allow a somewhat secure (hence somewhat insecure)
page to get represented as a wholly secure web page. To me, the page is
either secure or insecure, not something between. See the following
settings:
security.mixed_content.block.active_content
security.mixed_content.block.display_content <-- images
They made that decision (to allow insecure sourced images within secure
pages) because so many sites violate the precept of using HTTPS for
securing a web page. Since so many sites do it, bend to their
sloppiness so you don't break so many sites. Yeah, I know that sites
come up with their own reasons for delivering insecure images to their
secure web pages (probably so they can show ads from off-domain
resources, like CDNs [content delivery networks]).