W
William Bardwell
So, with XP SP2, the filetype registered by this application are now
considered to be dangerous. You get a pop-up which says:
Some files can harm your computer. If the file information below looks
suspicious, or you do not fully trust the source, do not open or save
this file....
when you try to click on a hyper link to a file of this type (but
embeded it is ok.)
I want to have this file type be browse-able without the pop-up happening.
If I set HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\MAIN\
FEATURECONTROL\FEATURE_MIME_HANDLING to 0, it doesn't do the pop-up,
but turning off a security feature totally seems like a bad idea.
However, despite what the docs for SP2 claim, the mime-type from the
web server and the file suffix do match...(So maybe it is the "MIME
sniffer"?)
The file suffix of my test file is .curl and the mime-type is text/vnd.curl,
and the registry keys used to register the type are in the attachment.
I tried changing the EditFlags to 0x10000 (aka FTA_OpenIsSafe), but that
didn't have any effect. PDF files with the Acrobat Active Document
Server work fine, without the pop-up, so it should be possible for this
one to work, but I am afraid that they have been hard coded into IE
somehow. This file type is being handled by an ActiveDocumentServer COM
doo-dad.
You can replicate the problem by downloading and installed
Surge 3.0 (RTE or IDE) from http://www.curl.com/solutions/download.php
and then click on the "Executive Dashboard" from
http://www.curl.com/solutions/demos.php
P.S. I am working on activating my MSDN membership, but do I then have
to start an incident via phone? Is there support via e-mail?
William
(e-mail address removed)
[HKEY_CLASSES_ROOT]
[HKEY_CLASSES_ROOT\.curl]
@="Curl.Applet"
"Content Type"="text/vnd.curl"
[HKEY_CLASSES_ROOT\.curl\PersistentHandler]
@="{5e941d80-bf96-11cd-b579-08002b30bfeb}"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}]
@="Curl Applet"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\Control]
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\DocObject]
@="0"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\InprocServer32]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\iecontrol.dll"
"ThreadingModel"="Apartment"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\Insertable]
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\MiscStatus]
@="0"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\MiscStatus\1]
@="131473"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\ProgID]
@="Curl.Applet.1"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\ToolboxBitmap32]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\iecontrol.dll, 1"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\TypeLib]
@="{35852062-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\Version]
@="3.0"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\VersionIndependentProgID]
@="Curl.Applet"
[HKEY_CLASSES_ROOT\curl]
@="URL:Curl Protocol"
"URL Protocol"=""
[HKEY_CLASSES_ROOT\curl\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-405"
[HKEY_CLASSES_ROOT\curl\shell]
@=""
[HKEY_CLASSES_ROOT\curl\shell\open]
@=""
[HKEY_CLASSES_ROOT\curl\shell\open\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --browse \"%1\""
[HKEY_CLASSES_ROOT\Curl Project File]
@="Curl Project File"
[HKEY_CLASSES_ROOT\Curl Project File\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-403"
[HKEY_CLASSES_ROOT\Curl Project File\shell]
@="open"
[HKEY_CLASSES_ROOT\Curl Project File\shell\open]
@="&Open"
[HKEY_CLASSES_ROOT\Curl Project File\shell\open\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --edit \"%1\""
[HKEY_CLASSES_ROOT\Curl Script]
@="Curl Script"
[HKEY_CLASSES_ROOT\Curl Script\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-405"
[HKEY_CLASSES_ROOT\Curl Script\shell]
@="edit"
[HKEY_CLASSES_ROOT\Curl Script\shell\edit]
@="&Edit"
[HKEY_CLASSES_ROOT\Curl Script\shell\edit\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --edit \"%1\""
[HKEY_CLASSES_ROOT\Curl Source File]
@="Curl Source File"
[HKEY_CLASSES_ROOT\Curl Source File\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-405"
[HKEY_CLASSES_ROOT\Curl Source File\shell]
@="edit"
[HKEY_CLASSES_ROOT\Curl Source File\shell\edit]
@="&Edit"
[HKEY_CLASSES_ROOT\Curl Source File\shell\edit\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --edit \"%1\""
[HKEY_CLASSES_ROOT\Curl.Applet]
@="Curl Applet"
"EditFlags"=hex:00,00,01,00
[HKEY_CLASSES_ROOT\Curl.Applet\CLSID]
@="{35852060-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\Curl.Applet\CurVer]
@="Curl.Applet.1"
[HKEY_CLASSES_ROOT\Curl.Applet\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-405"
[HKEY_CLASSES_ROOT\Curl.Applet\DocObject]
@="0"
[HKEY_CLASSES_ROOT\Curl.Applet\shell]
@="open"
[HKEY_CLASSES_ROOT\Curl.Applet\shell\browse]
@="&Browse"
[HKEY_CLASSES_ROOT\Curl.Applet\shell\browse\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --browse \"%1\""
[HKEY_CLASSES_ROOT\Curl.Applet\shell\edit]
@="&Edit"
[HKEY_CLASSES_ROOT\Curl.Applet\shell\edit\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --edit \"%1\""
[HKEY_CLASSES_ROOT\Curl.Applet\shell\open]
@="&Open"
[HKEY_CLASSES_ROOT\Curl.Applet\shell\open\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --open \"%1\""
[HKEY_CLASSES_ROOT\Curl.Applet.1]
@="Curl Applet"
"EditFlags"=hex:00,00,01,00
[HKEY_CLASSES_ROOT\Curl.Applet.1\CLSID]
@="{35852060-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\Curl.Applet.1\DocObject]
@="0"
[HKEY_CLASSES_ROOT\Curl.Surge]
@="Curl Applet"
[HKEY_CLASSES_ROOT\Curl.Surge\CLSID]
@="{35852060-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\Interface\{77693F63-712E-11D3-B9C1-006008C09EEE}]
@="ICurlHost"
[HKEY_CLASSES_ROOT\Interface\{77693F63-712E-11D3-B9C1-006008C09EEE}\ProxyStubClsid]
@="{00020424-0000-0000-C000-000000000046}"
[HKEY_CLASSES_ROOT\Interface\{77693F63-712E-11D3-B9C1-006008C09EEE}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
[HKEY_CLASSES_ROOT\Interface\{77693F63-712E-11D3-B9C1-006008C09EEE}\TypeLib]
@="{5512FBE1-6798-11D3-B9BA-006008C09EEE}"
"Version"="1.0"
[HKEY_CLASSES_ROOT\MIME\Database\Content Type\application/vnd.curl]
"Extension"=".curl"
"CLSID"="{35852060-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}]
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0]
@="CurlAXControl 1.0 Type Library"
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0\0\win32]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\iecontrol.dll"
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0\FLAGS]
@="0"
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0\HELPDIR]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\"
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}]
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0]
@="curl plugin 1.0 Type Library"
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0\0\win32]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\surge.exe"
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0\FLAGS]
@="0"
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0\HELPDIR]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\"
considered to be dangerous. You get a pop-up which says:
Some files can harm your computer. If the file information below looks
suspicious, or you do not fully trust the source, do not open or save
this file....
when you try to click on a hyper link to a file of this type (but
embeded it is ok.)
I want to have this file type be browse-able without the pop-up happening.
If I set HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\MAIN\
FEATURECONTROL\FEATURE_MIME_HANDLING to 0, it doesn't do the pop-up,
but turning off a security feature totally seems like a bad idea.
However, despite what the docs for SP2 claim, the mime-type from the
web server and the file suffix do match...(So maybe it is the "MIME
sniffer"?)
The file suffix of my test file is .curl and the mime-type is text/vnd.curl,
and the registry keys used to register the type are in the attachment.
I tried changing the EditFlags to 0x10000 (aka FTA_OpenIsSafe), but that
didn't have any effect. PDF files with the Acrobat Active Document
Server work fine, without the pop-up, so it should be possible for this
one to work, but I am afraid that they have been hard coded into IE
somehow. This file type is being handled by an ActiveDocumentServer COM
doo-dad.
You can replicate the problem by downloading and installed
Surge 3.0 (RTE or IDE) from http://www.curl.com/solutions/download.php
and then click on the "Executive Dashboard" from
http://www.curl.com/solutions/demos.php
P.S. I am working on activating my MSDN membership, but do I then have
to start an incident via phone? Is there support via e-mail?
William
(e-mail address removed)
[HKEY_CLASSES_ROOT]
[HKEY_CLASSES_ROOT\.curl]
@="Curl.Applet"
"Content Type"="text/vnd.curl"
[HKEY_CLASSES_ROOT\.curl\PersistentHandler]
@="{5e941d80-bf96-11cd-b579-08002b30bfeb}"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}]
@="Curl Applet"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\Control]
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\DocObject]
@="0"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\InprocServer32]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\iecontrol.dll"
"ThreadingModel"="Apartment"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\Insertable]
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\MiscStatus]
@="0"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\MiscStatus\1]
@="131473"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\ProgID]
@="Curl.Applet.1"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\Programmable]
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\ToolboxBitmap32]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\iecontrol.dll, 1"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\TypeLib]
@="{35852062-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\Version]
@="3.0"
[HKEY_CLASSES_ROOT\CLSID\{35852060-AFB4-11d2-B958-006008C09EEE}\VersionIndependentProgID]
@="Curl.Applet"
[HKEY_CLASSES_ROOT\curl]
@="URL:Curl Protocol"
"URL Protocol"=""
[HKEY_CLASSES_ROOT\curl\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-405"
[HKEY_CLASSES_ROOT\curl\shell]
@=""
[HKEY_CLASSES_ROOT\curl\shell\open]
@=""
[HKEY_CLASSES_ROOT\curl\shell\open\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --browse \"%1\""
[HKEY_CLASSES_ROOT\Curl Project File]
@="Curl Project File"
[HKEY_CLASSES_ROOT\Curl Project File\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-403"
[HKEY_CLASSES_ROOT\Curl Project File\shell]
@="open"
[HKEY_CLASSES_ROOT\Curl Project File\shell\open]
@="&Open"
[HKEY_CLASSES_ROOT\Curl Project File\shell\open\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --edit \"%1\""
[HKEY_CLASSES_ROOT\Curl Script]
@="Curl Script"
[HKEY_CLASSES_ROOT\Curl Script\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-405"
[HKEY_CLASSES_ROOT\Curl Script\shell]
@="edit"
[HKEY_CLASSES_ROOT\Curl Script\shell\edit]
@="&Edit"
[HKEY_CLASSES_ROOT\Curl Script\shell\edit\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --edit \"%1\""
[HKEY_CLASSES_ROOT\Curl Source File]
@="Curl Source File"
[HKEY_CLASSES_ROOT\Curl Source File\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-405"
[HKEY_CLASSES_ROOT\Curl Source File\shell]
@="edit"
[HKEY_CLASSES_ROOT\Curl Source File\shell\edit]
@="&Edit"
[HKEY_CLASSES_ROOT\Curl Source File\shell\edit\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --edit \"%1\""
[HKEY_CLASSES_ROOT\Curl.Applet]
@="Curl Applet"
"EditFlags"=hex:00,00,01,00
[HKEY_CLASSES_ROOT\Curl.Applet\CLSID]
@="{35852060-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\Curl.Applet\CurVer]
@="Curl.Applet.1"
[HKEY_CLASSES_ROOT\Curl.Applet\DefaultIcon]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe,-405"
[HKEY_CLASSES_ROOT\Curl.Applet\DocObject]
@="0"
[HKEY_CLASSES_ROOT\Curl.Applet\shell]
@="open"
[HKEY_CLASSES_ROOT\Curl.Applet\shell\browse]
@="&Browse"
[HKEY_CLASSES_ROOT\Curl.Applet\shell\browse\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --browse \"%1\""
[HKEY_CLASSES_ROOT\Curl.Applet\shell\edit]
@="&Edit"
[HKEY_CLASSES_ROOT\Curl.Applet\shell\edit\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --edit \"%1\""
[HKEY_CLASSES_ROOT\Curl.Applet\shell\open]
@="&Open"
[HKEY_CLASSES_ROOT\Curl.Applet\shell\open\command]
@="f:\\PROGRA~1\\CURLCO~1\\Surge\\4\\bin\\surge-do.exe --open \"%1\""
[HKEY_CLASSES_ROOT\Curl.Applet.1]
@="Curl Applet"
"EditFlags"=hex:00,00,01,00
[HKEY_CLASSES_ROOT\Curl.Applet.1\CLSID]
@="{35852060-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\Curl.Applet.1\DocObject]
@="0"
[HKEY_CLASSES_ROOT\Curl.Surge]
@="Curl Applet"
[HKEY_CLASSES_ROOT\Curl.Surge\CLSID]
@="{35852060-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\Interface\{77693F63-712E-11D3-B9C1-006008C09EEE}]
@="ICurlHost"
[HKEY_CLASSES_ROOT\Interface\{77693F63-712E-11D3-B9C1-006008C09EEE}\ProxyStubClsid]
@="{00020424-0000-0000-C000-000000000046}"
[HKEY_CLASSES_ROOT\Interface\{77693F63-712E-11D3-B9C1-006008C09EEE}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
[HKEY_CLASSES_ROOT\Interface\{77693F63-712E-11D3-B9C1-006008C09EEE}\TypeLib]
@="{5512FBE1-6798-11D3-B9BA-006008C09EEE}"
"Version"="1.0"
[HKEY_CLASSES_ROOT\MIME\Database\Content Type\application/vnd.curl]
"Extension"=".curl"
"CLSID"="{35852060-AFB4-11d2-B958-006008C09EEE}"
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}]
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0]
@="CurlAXControl 1.0 Type Library"
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0\0\win32]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\iecontrol.dll"
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0\FLAGS]
@="0"
[HKEY_CLASSES_ROOT\TypeLib\{35852062-AFB4-11D2-B958-006008C09EEE}\1.0\HELPDIR]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\"
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}]
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0]
@="curl plugin 1.0 Type Library"
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0\0]
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0\0\win32]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\surge.exe"
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0\FLAGS]
@="0"
[HKEY_CLASSES_ROOT\TypeLib\{5512FBE1-6798-11D3-B9BA-006008C09EEE}\1.0\HELPDIR]
@="f:\\Program Files\\Curl Corporation\\Surge\\4\\bin\\"