I'm providing additional information below to make it easier to replicate the error when testing. I updated Torbrowser yesterday to version 11.5, which now includes a HTTPS check. This is how I began observing the issue.
Steps to replicate:
Install latest Torbrowser - current (11.5 (based on Mozilla Firefox 91.11.0esr) (64-bit))
navigate to conspiracies.win, patriots.win, or another affiliated .win domain
click login, redirected to login page
enter login credentials.
click the 'sign in' button
On first login attempt Torbrowser will return the error and refreshes to
If you click the login button again a second time, the cookie recognizes an active session, but you are not actually fully logged in, returns an error and refreshes to
If attempting to login from https://scored.co/c/Conspiracies/ or https://scored.co/c/TheDonald/ you are not redirected to a login page --> a pop-up window appears. input login credentials, click "login', and you successfully login without any HTTPS error warnings.
So the deprecated domain is redirecting to the new server to pass a login token- that's my impression of what you just described. I think this might be expected if the authenticating server has changed addresses (ie. the redirect). Can you trace the redirect IP?
You're welcome to troubleshoot further. There's not a lot I can do further. Doggos and others are aware of the issue and it apparently is being looked at.
Doggos I believe you're aware of this now.
/u/Doggos
/u/axolotl_peyotl
/u/PutinLovesCats
I reported, but you might want to escalate yourself
https://scored.co/c/Meta/p/15Ir26aZgy/
This warning does not appear when visiting via the domain scored.co.
I'm currently posting via
https://scored.co/c/Conspiracies as attempting to authenticate via conspiracies.win returns a similar warning.
Domain: cloudflare.inc
Certificate: valid
? I can't replicate
The HTTPS warning error is still present.
I'm providing additional information below to make it easier to replicate the error when testing. I updated Torbrowser yesterday to version 11.5, which now includes a HTTPS check. This is how I began observing the issue.
Steps to replicate:
Install latest Torbrowser - current (11.5 (based on Mozilla Firefox 91.11.0esr) (64-bit))
navigate to conspiracies.win, patriots.win, or another affiliated .win domain
click login, redirected to login page
enter login credentials.
click the 'sign in' button
On first login attempt Torbrowser will return the error and refreshes to
http://authentication.win/authenticated?com=https://patriots.win/&community=TheDonald
http://authentication.win/authenticated?com=https://conspiracies.win/&community=Conspiracies
If you click the login button again a second time, the cookie recognizes an active session, but you are not actually fully logged in, returns an error and refreshes to
http://authentication.win/session?site=TheDonald&return=https://patriots.win/
http://authentication.win/session?site=Conspiracies&return=https://conspiracies.win/
...
Workaround (no warning/ error)
If attempting to login from https://scored.co/c/Conspiracies/ or https://scored.co/c/TheDonald/ you are not redirected to a login page --> a pop-up window appears. input login credentials, click "login', and you successfully login without any HTTPS error warnings.
So the deprecated domain is redirecting to the new server to pass a login token- that's my impression of what you just described. I think this might be expected if the authenticating server has changed addresses (ie. the redirect). Can you trace the redirect IP?
the error message you have posted has no useful information
perhaps "Learn more" will tell you the answer
or opening your browsers dev tools (f12)
I posted steps to replicate the HTTPS warning error here
https://scored.co/c/Conspiracies/p/15Ir26aqjz/x/c/4Ob7hbZVrMs?d=50
You're welcome to troubleshoot further. There's not a lot I can do further. Doggos and others are aware of the issue and it apparently is being looked at.