 |
 |
 |
E-Hentai Galleries feature requests, centralized place to discuss improvements to the galleries |
|
Jun 5 2010, 01:18
|
NoNameNoBlame
Group: Gold Star Club
Posts: 7,641
Joined: 20-July 08

|
QUOTE(Dlaglacz @ Jun 4 2010, 21:07)  It is on my Firefox. It isn't in Opera. QUOTE(NJH @ Jun 4 2010, 21:54)  after the doggie bag archives no more i cnt download anymore its kulled "Archive Download" nao, possably too make it les confusin phoar... peopleses liek ewe.
|
|
|
Jun 23 2010, 22:25
|
Red of EHCOVE
Group: Gold Star Club
Posts: 9,493
Joined: 28-April 07

|
Could we have progress bars for upload status?
|
|
|
Jun 24 2010, 16:20
|
Sayo Aisaka
Group: Members
Posts: 4,556
Joined: 27-September 08

|
QUOTE(Red_Piotrus @ Jun 23 2010, 21:25)  Could we have progress bars for upload status?
Apparently not.
|
|
|
Jun 29 2010, 13:19
|
Enjou
Group: Gold Star Club
Posts: 146
Joined: 13-May 06

|
Don't know if it's been suggested or if it might arleady exist, but what about adding a way to exclude tags when searching. For instance, some anime series have a higher amount of yaoi, so maybe someone searching would like to exclude all the yaoi results by putting "!yaoi" in their search bar or adding an exclude field to the advanced search.
|
|
|
Jun 29 2010, 15:05
|
Rikis
Group: Gold Star Club
Posts: 3,680
Joined: 7-July 09

|
QUOTE(Enjou @ Jun 29 2010, 14:19)  Don't know if it's been suggested or if it might arleady exist, but what about adding a way to exclude tags when searching. For instance, some anime series have a higher amount of yaoi, so maybe someone searching would like to exclude all the yaoi results by putting "!yaoi" in their search bar or adding an exclude field to the advanced search.
Try -yaoi . It's same in every web search...
|
|
|
|
 |
|
Jun 29 2010, 16:17
|
Hairs Fan
Group: Members
Posts: 859
Joined: 15-September 08

|
Could we have a secure login page to avoid sending our passwords unencrypted whenever we log into EH ? Using HTTPS seems to be the best solution from the user side (especially if we can then browse the whole website through HTTPS), but maybe an HMAC scheme (using JS) will be secure enough. I know I could create a secure tunnel to a trusted network, and connect to EH through that tunnel, but it isn't always possible to create the tunnel depending on the network you're connecting from (and also if your trusted network is partially banned from EH (IMG:[ invalid] style_emoticons/default/rolleyes.gif)). QUOTE(Sayo Aisaka @ Jun 24 2010, 16:20)  QUOTE(Red_Piotrus @ Jun 23 2010, 22:25)  Could we have progress bars for upload status?
Apparently not. Actually, now that both Firefox and Chrome support the "file" input type, such a feature could probably be implemented (without needing to patch PHP). There's a project [ code.google.com] here trying to create a library that works with any browser (though the accuracy of the progress bar will depend on the browser features).
|
|
|
|
 |
|
Jun 29 2010, 18:47
|
Tenboro

|
QUOTE(Hairs' Fan @ Jun 29 2010, 16:17)  Could we have a secure login page to avoid sending our passwords unencrypted whenever we log into EH ? Using HTTPS seems to be the best solution from the user side (especially if we can then browse the whole website through HTTPS), but maybe an HMAC scheme (using JS) will be secure enough.
I have considered offering HTTPS, but there are a few problems with doing so, some trivial and others less so. Just doing it on the login page isn't too hard, except that you'd need it both on the forums and on the "bounce" page. Meaning I'd have to get either an expensive wildcard certificate or maintain several certificates. Extending it to Galleries or Classic would be either a complete bitch, or spam you with mixed mode errors. I'd have to set up SSL and certificates on all the thumbnail and image servers to avoid the latter, and the H@H network would not be usable unless all clients have a) two ports and b) their own certificate - nor would it be compatible for use as a proxy. Essentially, I'm not sure it's worth the effort. QUOTE(Hairs' Fan @ Jun 29 2010, 16:17)  Actually, now that both Firefox and Chrome support the "file" input type, such a feature could probably be implemented (without needing to patch PHP). There's a project [ code.google.com] here trying to create a library that works with any browser (though the accuracy of the progress bar will depend on the browser features). Thanks, I'll keep an eye on that.
|
|
|
|
 |
|
Jun 29 2010, 22:33
|
darksamurai519
Newcomer
 Group: Members
Posts: 20
Joined: 16-June 10

|
I find something weird whenever I view the current toplist ranking for any of my galleries. When a gallery appears not to be in the top 10,000 for a given toplist, no ranking is given, and instead a message reading "Not currently Top 1000" Is this something commonly known that would be too difficult to fix?
|
|
|
|
 |
|
Jun 30 2010, 01:13
|
Hairs Fan
Group: Members
Posts: 859
Joined: 15-September 08

|
QUOTE(Tenboro @ Jun 29 2010, 18:47)  Essentially, I'm not sure it's worth the effort.
That's why I mentioned the [ en.wikipedia.org] HMAC solution which is easy to implement and can still protect the credentials without the need to buy a certificate. It will probably be unimplementable on the forum without patching the IPB source code, but if there's at least one webpage which allows us to log in securely to the EH realm (the bounce page for instance), then it will still be better than nothing (IMG:[ invalid] style_emoticons/default/smile.gif)
|
|
|
Jul 1 2010, 18:47
|
Golden Sun
Group: Members
Posts: 2,079
Joined: 9-April 10

|
Feature that allows users to subtract power from expunges, rather than waiting for the gallery to be expunged and then de-expunging.
|
|
|
Jul 1 2010, 20:31
|
areth
Group: Members
Posts: 460
Joined: 16-August 09

|
QUOTE(Tenboro @ Jun 29 2010, 11:47)  Meaning I'd have to get either an expensive wildcard certificate or maintain several certificates.
Cacert.org... Expensive? The caveat being that the users here would get an annoying pop-up because they need to add cacert to their trusted authorities. Though, cacert might be in firefox's already. I can't really remember right now (IMG:[ invalid] style_emoticons/default/smile.gif) *editted because I'm too stupid to type properly when I first wake up. This post has been edited by areth: Jul 1 2010, 20:32
|
|
|
|
 |
|
Jul 1 2010, 21:41
|
Tenboro

|
Yeeeeah, certificates from an untrusted root authority? Those are worthless, as far as security goes, as anyone could spoof them as a signing authority and perform a MITM attack with only slightly more complexity than eavesdropping on the unencrypted stream.
In that case, I'd rather sign my own.
|
|
|
Jul 1 2010, 22:27
|
Hairs Fan
Group: Members
Posts: 859
Joined: 15-September 08

|
QUOTE(Tenboro @ Jul 1 2010, 21:41)  Yeeeeah, certificates from an untrusted root authority? Those are worthless, as far as security goes, as anyone could spoof them as a signing authority and perform a MITM attack with only slightly more complexity than eavesdropping on the unencrypted stream.
Certificates from so called "trusted" root authority [ www.eff.org] aren't better anyway (IMG:[ invalid] style_emoticons/default/sad.gif)
|
|
|
|
 |
|
Jul 1 2010, 23:16
|
Tenboro

|
QUOTE(Hairs' Fan @ Jul 1 2010, 22:27)  Certificates from so called "trusted" root authority [ www.eff.org] aren't better anyway (IMG:[ invalid] style_emoticons/default/sad.gif) Yeah, I've suspected that they have that capability. At the very least, if a signing authority is based in the same country as the government in question, they could easily demand the signing keys and issue a gag order preventing them from telling anyone. And that's assuming the signing keys aren't shared per default. But in terms of securing a connection from a third-party snooper, it's still a step up - the only ones capable of spoofing a valid certificate would be the people who have access to the signing keys for some trusted authority. This is unlike a non-trusted root authority which can pretty much be spoofed by anyone. And unless you're planning to blow up a building, I somehow doubt that these governments want to risk divulging that they have the capability to intercept encrypted connections. It is a bit suspect that the export restrictions on encryption were suddenly removed, innit? If you trust your communications to something you think is safe, but a hostile entity has the keys to the backdoor, well..
|
|
|
|
 |
|
Jul 1 2010, 23:29
|
Spectre
Group: Global Mods
Posts: 8,640
Joined: 8-February 06

|
QUOTE(Golden Sun @ Jul 1 2010, 12:47)  Feature that allows users to subtract power from expunges, rather than waiting for the gallery to be expunged and then de-expunging.
For what it is worth, petitions that do not reach 100%+ after a number of days (is it 10? I can't remember) and get wiped from the gallery, and users can subtract their own petitions. Also, de-expunging can happen any time, as it is a tool to wipe expunges regardless of the percentage amount. So unless the petition succeeds they go away after some time, and getting a bunch of people to vote down expunges is more work than letting it wipe itself.
|
|
|
|
 |
|
Jul 2 2010, 03:44
|
areth
Group: Members
Posts: 460
Joined: 16-August 09

|
Hmm. In their defense, CACert does have checks to make sure that you have ownership or control over the domain in question. As for 'trusted' authorities... Well, 'nuff said. However, a lot of users would get scared because of the acceptance dialog anyway, and self-signing is easy, so there is that...
|
|
|
Jul 2 2010, 12:42
|
Red of EHCOVE
Group: Gold Star Club
Posts: 9,493
Joined: 28-April 07

|
When a gallery is updated, stars, templates and comments are moved. What is not is favorites and rename/expunge votes. Shouldn't they be moved as well (perhaps not the expunges, as the new gallery can be fixing the problems of the old, but the rest?)
On the other hand, torrents are moved as well - which is a problem, as they are almost guaranteed NOT to represent the updated gallery.
This post has been edited by Red_Piotrus: Jul 2 2010, 12:43
|
|
|
|
 |
|
Jul 2 2010, 18:25
|
Hairs Fan
Group: Members
Posts: 859
Joined: 15-September 08

|
QUOTE(Tenboro @ Jul 1 2010, 23:16)  And unless you're planning to blow up a building, I somehow doubt that these governments want to risk divulging that they have the capability to intercept encrypted connections.
I'm sure they can also risk that with complete impunity in the name of the child porn hunt (most people in that board know that lolicon/shotacon shouldn't be associated with child porn, but it probably comes from a reflection that most people won't bother to do). But you're right, trusted root authorities limit the number of potential attackers. I'd rather trust a self-signed certificate from you for EH though (but I guess educating people about why their browsers are whining about the validity of the CA would probably take too much effort) ...
|
|
|
|
 |
|
Jul 2 2010, 19:43
|
Tenboro

|
QUOTE(Hairs' Fan @ Jul 2 2010, 18:25)  But you're right, trusted root authorities limit the number of potential attackers. I'd rather trust a self-signed certificate from you for EH though (but I guess educating people about why their browsers are whining about the validity of the CA would probably take too much effort) ...
Here's the kicker, though. How can you know that the self-signed certificate from me is really from me? That someone hasn't stuck a box between the E-H servers and yourself, and replaced it with a different certificate? There's no way to ensure the authenticity of the certificate in question unless it's signed by another, trusted, certificate. In order to understand recursion, you must first understand recursion. (IMG:[ invalid] style_emoticons/default/smile.gif)
|
|
|
|
 |
|
Jul 2 2010, 20:34
|
Hairs Fan
Group: Members
Posts: 859
Joined: 15-September 08

|
QUOTE(Tenboro @ Jul 2 2010, 19:43)  Here's the kicker, though. How can you know that the self-signed certificate from me is really from me?
Me, personally ? Well, as soon as you'll publish your very first self-signed certificate, I'll be able to recognize your CA, and say when it'll be spoofed (IMG:[ invalid] style_emoticons/default/smile.gif) But yeah, other new users that might come after the certificate has been spoofed won't be able to detect anything. Errr ... ok ok, browsers are right when they warn about error because of certificates signed by an unknown CA (IMG:[ invalid] style_emoticons/default/dry.gif)
|
|
|
1 User(s) are reading this topic (1 Guests and 0 Anonymous Users)
0 Members:
|
 |
 |
 |
|