diff --git a/libi2pd_client/HTTPProxy.cpp b/libi2pd_client/HTTPProxy.cpp
index a41320be..cecda2bb 100644
--- a/libi2pd_client/HTTPProxy.cpp
+++ b/libi2pd_client/HTTPProxy.cpp
@@ -333,7 +333,6 @@ namespace proxy {
}
else if (!i2p::client::context.GetAddressBook ().FindAddress (m_RequestURL.host) || m_Confirm)
{
- // Referer check to prevent forced overwriting by link with "&update=true" from harmful URL
const std::string referer_raw = m_ClientRequest.GetHeader("Referer");
i2p::http::URL referer_url;
if (!referer_raw.empty ())
@@ -342,6 +341,7 @@ namespace proxy {
}
if (m_RequestURL.host != referer_url.host)
{
+ // Attempt to forced overwriting by link with "&update=true" from harmful URL
if (m_Confirm)
{
LogPrint (eLogWarning, "HTTPProxy: Address update from addresshelper rejected for ", m_RequestURL.host, " (referer is ", m_RequestURL.host.empty() ? "empty" : "harmful", ")");
@@ -354,13 +354,13 @@ namespace proxy {
ss << jump << "&update=true\">" << tr("Continue") << ".";
GenericProxyInfo(tr("Addresshelper forced update rejected"), ss.str());
}
+ // Preventing unauthorized additions to the address book
else
{
LogPrint (eLogDebug, "HTTPProxy: Adding address from addresshelper for ", m_RequestURL.host, " (generate refer-base page)");
std::string full_url = m_RequestURL.to_string();
std::stringstream ss;
- ss << tr("To add host") << " " << m_RequestURL.host << " " << tr("in router's addressbook") << ", ";
- ss << tr("click here") << ":";
+ ss << tr("To add host" /*... in router's addressbook, click here */ ) << " " << m_RequestURL.host << " " << tr( /* To add host SOMESHORT.i2p ... */ "in router's addressbook, click here") << ":";
ss << " " << tr("Continue") << ".";
GenericProxyInfo(tr("Addresshelper request"), ss.str());