@@ -62,8 +62,9 @@ int InternetInterfaces.IInternetSecurityManager.GetSecuritySite(out IntPtr pSite
6262 }
6363
6464 int InternetInterfaces . IInternetSecurityManager . MapUrlToZone ( [ MarshalAs ( UnmanagedType . LPWStr ) ] string pwszUrl , ref uint pdwZone , uint dwFlags ) {
65- pdwZone = 0 ;
66- return INET_E_DEFAULT_ACTION ;
65+ // behave like local intranet
66+ pdwZone = 1 ;
67+ return S_OK ;
6768 }
6869
6970 int InternetInterfaces . IInternetSecurityManager . GetSecurityId ( [ MarshalAs ( UnmanagedType . LPWStr ) ] string pwszUrl , [ MarshalAs ( UnmanagedType . LPArray ) ] byte [ ] pbSecurityId , ref uint pcbSecurityId , uint dwReserved ) {
@@ -77,7 +78,6 @@ int InternetInterfaces.IInternetSecurityManager.ProcessUrlAction([MarshalAs(Unma
7778 dwAction == URLACTION_HTML_MIXED_CONTENT || // block HTTPS content on HTTP websites for Flashpoint Proxy
7879 dwAction == URLACTION_CLIENT_CERT_PROMPT || // don't allow invalid certificates
7980 dwAction == URLACTION_AUTOMATIC_ACTIVEX_UI || // do not display the install dialog for ActiveX Controls
80- dwAction == URLACTION_ALLOW_RESTRICTEDPROTOCOLS || // use same settings for every protocol
8181 dwAction == URLACTION_ALLOW_APEVALUATION || // the phishing filter is not applicable to this application
8282 dwAction == URLACTION_LOWRIGHTS || // turn off Protected Mode
8383 dwAction == URLACTION_ALLOW_ACTIVEX_FILTERING ) { // don't allow ActiveX filtering
@@ -90,14 +90,20 @@ int InternetInterfaces.IInternetSecurityManager.ProcessUrlAction([MarshalAs(Unma
9090 return S_OK ;
9191 }
9292
93+ pPolicy = 0x00010000 ;
94+
95+ if ( dwAction == 0x00002007 ) { // undocumented action: permissions for components with manifests
96+ return S_OK ;
97+ }
98+
9399 pPolicy = URLPOLICY_ALLOW ;
94100
95101 if ( ( dwAction >= URLACTION_DOWNLOAD_MIN && dwAction <= URLACTION_DOWNLOAD_MAX ) || // allow downloading ActiveX Controls, scripts, etc.
96102 ( dwAction >= URLACTION_ACTIVEX_MIN && dwAction <= URLACTION_ACTIVEX_MAX ) || // allow ActiveX Controls
97103 ( dwAction >= URLACTION_SCRIPT_MIN && dwAction <= URLACTION_SCRIPT_MAX ) || // allow scripts
98104 ( dwAction >= URLACTION_HTML_MIN && dwAction <= URLACTION_HTML_MAX ) || // allow forms, fonts, meta elements, etc.
99105 ( dwAction >= URLACTION_JAVA_MIN && dwAction <= URLACTION_JAVA_MAX ) || // allow Java applets
100- dwAction == URLACTION_COOKIES || // allow all cookies, which are not in fact dangerous and are in fact harmless plaintext files that don't have any code in them
106+ dwAction == URLACTION_COOKIES || // allow all cookies
101107 dwAction == URLACTION_COOKIES_SESSION ||
102108 dwAction == URLACTION_COOKIES_THIRD_PARTY ||
103109 dwAction == URLACTION_COOKIES_SESSION_THIRD_PARTY ||
@@ -108,6 +114,7 @@ int InternetInterfaces.IInternetSecurityManager.ProcessUrlAction([MarshalAs(Unma
108114 dwAction == URLACTION_DOTNET_USERCONTROLS || // allow .NET user controls
109115 dwAction == URLACTION_FEATURE_DATA_BINDING || // allow databinding
110116 dwAction == URLACTION_FEATURE_CROSSDOMAIN_FOCUS_CHANGE || // allow crossdomain
117+ dwAction == URLACTION_ALLOW_RESTRICTEDPROTOCOLS || // allow active content regardless of if the protocol is restricted
111118 dwAction == URLACTION_ALLOW_AUDIO_VIDEO || // allow audio and video always
112119 dwAction == URLACTION_ALLOW_AUDIO_VIDEO_PLUGINS ||
113120 dwAction == URLACTION_ALLOW_CROSSDOMAIN_DROP_WITHIN_WINDOW || // allow crossdomain, again
0 commit comments