Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

Similarly, Mozilla recently had to freeze part of Firefox’s User-Agent string because some websites mistook Firefox 110 as IE 11 and blocked access because they no longer supported IE 11. The websites misinterpreted “rv:110” in Firefox’s Use-Agent string as “rv:11”.

https://bugzilla.mozilla.org/show_bug.cgi?id=1805967



sort by: page size:

> Firefox is may freeze the user agent to a two-digit number like "Firefox/99.0."

Opera did that when version went up from 9 to 10. Too many websites looked at first digit of version rather that doing feature discovery back then.

Useragent string of Opera 12 is "Opera/9.80 (Windows NT 6.1; WOW64) Presto/2.12.388 Version/12.18".


I think it's in the grand traditions of the web to fake your user agent if that's what it takes to get round this stupidity.

This is why every browser still has the string 'Mozilla' in their user-agent somewhere.


I often talk to people reporting a broken website in qutebrowser where it turns out to be due to a Firefox user agent.

Some examples (there are lots more via IRC/Reddit/...):

https://github.com/qutebrowser/qutebrowser/issues/4302 https://github.com/qutebrowser/qutebrowser/issues/3822 https://github.com/qutebrowser/qutebrowser/issues/1187


Or worse, Opera users will change their user agent string to Mozilla so as not to have to deal with ua-sniffing websites that work fine on Opera but warn you anyway about using a unsupported browser.

Sadly, this behavior is somewhat common for many sites that block firefox based on the user agent. At least form some webcompat bug issues I've looked at.

Even removing"Mozilla/" could break UA detection that uses hardcoded string indexes to version numberz. :(

Frankly, Firefox should take the nuclear option, and just start emulating Chrome with regard to website identifiable information.

In particular, User-Agent strings are now a net-negative. I've never run into a website that doesn't work on Firefox. I do occasionally run into websites that claim to not work on Firefox. We software developers have shown that we can't be trusted with information pertaining to what browser someone is using, and as such should have the privilege taken away. If you're reading this, and you have access to a codebase that reads User-Agent strings for anything more than idle curiosity, just delete it and push to master.


It's the severely-outdated Firefox version number. Spambots and crawlers sometimes have user-agent strings corresponding to very old browsers, because they were set once when the bot was created and then never updated. On an unrelated site that I run, we get a lot of traffic with user agent strings corresponding to implausibly-old browsers, and it's ~100% bots.

Browser vendors can't clean up User-Agent because the websites sniff it and break if it's "wrong" (for any random value of wrong).

I'm sure there's a Bugzilla bug about the "X11; Linux x86_64" in the headers, and I'd be terrified to open it.


"Your user-agent string specifies your browser as being a variant of FIREFOX. Judging by your fingerprint we believe your browser is a variant of FIREFOX. Your user-agent string specifies your operating system as being a variant of UNKNOWN. Judging by your fingerprint we believe your operating system is a variant of WINDOWS."

And yet

User agent is parsed as "Mozilla/5.0 (X11; OpenBSD amd64; rv:49.0) Gecko/20100101 Firefox/49.0 SeaMonkey/2.46". Which is actually the case.


Yeah, aren't we just making things a lot more messy? Especially if we're not planning on removing the User-Agent header?

This pattern keeps repeating itself, freeze "Mozilla/5.0", start changing "Chrome/71.1.2222.33", freeze that, start changing "Sec-CH-UA", etc. Browsers will start needing to fake "Sec-CH-UA" to get websites to work properly, etc.


Considering recent chrome, firefox user agent contains id string of almost every browser in existence, this is so true:

Mozilla/5.0 (...) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36


"> Microsoft also included the command "Like Gecko" which instructs the website to send back the same version of the website as they would to Firefox"

This is a little misleading. "Like Gecko" is not used in the Firefox UA String. It just says Gecko. "Like Gecko" is a component of Webkit-based browsers. So IE is emulating Webkit emulating Firefox, and dries the "MS" of "MSEI" for their string, and going with just "IE".

via Peter Paul-Koch: "IE11 to disguise itself as WebKit (and not Firefox!)", http://mobilism.nl/blog/2013/03/ie11-to-disguise-itself


How is that a bug when they say that's what the spec says. Also, both Edge and WebKit are going to adopt that behaviour since it makes sense.

I think there's one more reason people see less of Firefox. I know a LOT of people who have set their user agent string to Chrome to stop the idiotic banners on websites telling me to use Chrome even through the website works perfectly on FF. I hate it even more when websites simply won't allow me to load the page when I'm on FF.


That nightmare had to do with misbehaving servers. IE had to advertise as Mozilla so servers would serve the better response.

In this case it would be possible for a client to fake a UA, but it's more likely that they weren't aware they were doing things incorrectly and correct the behavior rather than opting in to mimicing a different UA to get the server to behave in a non-standard way.

I haven't seen this happen, and this is one of the most popular DAV implementations. I have seen people fix broken implementations as I've slowly been making the server more strict over the last 10 years.


Nah, there's plenty of examples of sites breaking on Firefox. For example, the recent degraded performance on Youtube linked to Firefox User Agent strings.

Firefox sends an easily identifiable user-agent string with every request.

If businesses want to operate on bad data (analytics that depend on JS), that's their fault.


It astonished me that the people who wrote the CDC covid tracker made it refuse Firefox visitors through User Agent checks. Mozilla had to add an intervention to spoof UA's, specifically on that site:

https://bugzilla.mozilla.org/show_bug.cgi?id=1719846 ("Bug 1719846: Add UA override for https://covid.cdc.gov/covid-data-tracker/")


I presume that would unfortunately break websites in _other_ ways, if they're UA-sniffing Firefox in unconventional ways. At that point they might as well remove it altogether instead of drastically changing the UA string.
next

Legal | privacy