Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Tor and Cloudflare #783

Closed
nchv opened this issue Jun 20, 2019 · 37 comments
Closed

Tor and Cloudflare #783

nchv opened this issue Jun 20, 2019 · 37 comments

Comments

@nchv
Copy link

nchv commented Jun 20, 2019

I would like to share my communication with Cloudflare's support in relation to problems with accessing sites using Cloudflare through Tor proxy.

There is definitely something which Tor Browser can do and which (ungoogled) Chromium cannot which results in the problems discussed below. I don't know what it is but I hope ungoogled-chromium will be able to provide a solution as CF's "protection" system right now is pretty much denying the possibility of using Tor + ungoogled-chromium for CF sites.

====================

From: **** <>
To: Cloudflare <
>
Subject: Using Tor without Tor Browser

Hi,

I am facing the following problem:

I have tor systemd service installed and running and browser (Chromium) set to use the Tor Socks proxy. I also have separately Tor Browser Bundle (TBB).

Opening sites which use Cloudlflare often present the well known captcha challenge of Clouldflare. But that does not happen in TBB. All this has nothing to do with a particular Tor circuit - it happens always: all circuits work in TBB, no circuit works in any other HTTP client.

I even tried to mimic TBB by copying literally the HTTP request headers in a curl script (attached) but even that didn't work - the curl script also hits the captcha. You can test it with https://cloudflare.com as an argument.

Why is this happening and what can I do so that I can open Cloudflare'd sites with a curl script or with a browser different from TBB?

Please when answering consider that I don't want to enable JavaScript or to reveal my IP address to Google through recaptcha as it contradicts the essential reason for using Tor. Neither I am willing to install any extension to bypass this.

#!/bin/bash

if [ -z "$1" ]; then
  echo "Supply URL as argument"
  exit 0
fi

# Scheme: "http://user:[email protected]:80/"
host=$(echo "${1}" | sed -e "s/[^/]*\/\/\([^@]*@\)\?\([^:/]*\).*/\2/")

curl "${1}" \
-H "Host: ${host}" \
-H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0' \
-H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8' \
-H 'Accept-Language: en-US,en;q=0.5' \
-H 'Accept-Encoding: gzip, deflate' \
-H 'DNT: 1' \
-H 'Connection: keep-alive' \
-H 'Upgrade-Insecure-Requests: 1' \
-L \
--proto-redir -all,http,https \
--compressed \
--proxy socks5h://127.0.0.1:9050/

====================

****, Apr 7, 8:18 PM PDT

Hi ****,

Thanks for contacting Cloudflare support.

You may refer to the following article for existing possible solution to proceed with,
Does Cloudflare block Tor?

Cheers,

******** | Cloudflare Support Engineer

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

Hi ****,

That article has nothing to do with my actual question. I am not asking how to tune my own website but how not to hit the captcha with an HTTP client different from TBB (as TBB doesn't hit it).

Could you please answer that?

====================

****, Apr 9, 8:11 PM PDT

Hi there,

In that case we will need more details on the exact steps for us to reproduce the issue faced, in case issue persist, please share with us:

  1. what is the expected behavior
  2. how does that differ from what you observe now
  3. FULL steps to reproduce - e.g. what exactly has been run for you to test the behavior

Please respond with that information if you run into the issue again so we can continue to work with you to resolve your issue.

Best regards,

******** | Cloudflare Support Engineer

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

Hi ****,

I am sharing the full STR, expected and actual behavior below. Please kindly pay equal attention to both (A) and (B).

STR:

  1. Install tor service

I am using tor-0.3.4.11-lp150.22.1.x86_64

  1. Use the following /etc/tor/torrc
SocksPolicy accept 127.0.0.1
SocksPolicy reject *
ControlPort 9051
HashedControlPassword ████

To generate HashedControlPassword use command:

$ tor --hash-password PASSWORD

Replace ████ with the output of the command in /etc/torrc

  1. Create the following bash script and name it tornc. It requests new tor circuit:
#!/bin/bash
password='PASSWORD' # the same password used above

cat <<EOF | nc 127.0.0.1 9051
AUTHENTICATE "${password}"
SIGNAL NEWNYM
quit
EOF
  1. Run as root:
# torctl restart
  1. Create the following bash script (shared in previous reply) and name it tor-curl:
#!/bin/bash

if [ -z "$1" ]; then
  echo "Supply URL as argument"
  exit 0
fi

# Scheme: "http://user:[email protected]:80/"
host=$(echo "${1}" | sed -e "s/[^/]*\/\/\([^@]*@\)\?\([^:/]*\).*/\2/")

curl -s "${1}" \
-H "Host: ${host}" \
-H 'User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0' \
-H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8' \
-H 'Accept-Language: en-US,en;q=0.5' \
-H 'Accept-Encoding: gzip, deflate' \
-H 'DNT: 1' \
-H 'Connection: keep-alive' \
-H 'Upgrade-Insecure-Requests: 1' \
-L \
--proto-redir -all,http,https \
--compressed \
--proxy socks5h://127.0.0.1:9050/
  1. Run:
$ tornc
$ ./tor-curl https://ipinfo.io/ip
$ ./tor-curl https://cloudflare.com | grep '<****>'
  1. Repeat 5

EXPECTED:

(A) tor-curl should be able to access the actual web page because it uses HTTP headers similar to those of Tor Browser (which can open the page)

(B) A security system using a challenge to protect the website should be GDPR compliant

ACTUAL:

(A) For every circuit without exception tor-curl hits the captcha and this happens for any website which uses this Cloudlflare feature (i.e. not only with https://cloudflare.com):

$ tornc
250 OK
250 OK
250 closing connection
$ ./tor-curl https://ipinfo.io/ip
85.248.227.165
$ ./tor-curl https://cloudflare.com | grep '<****>'
<****>
$ tornc
250 OK
250 OK
250 closing connection
$ ./tor-curl https://ipinfo.io/ip
199.249.230.70
$ ./tor-curl https://cloudflare.com | grep '<****>'
<****>

As you see: there is nothing malicious in using a script like tor-curl but Cloudflare is blocking ("challenging") it. Tor Browser does open the sites using Clouldflare though (and I don't know why).

(B) The current protection system of Cloudflare is non-GDPR compliant because:

  • It doesn't follow the principle of data minimisation:

    Article 5(1)(c) https://gdpr-info.eu/art-5-gdpr/

    "1. Personal data shall be:

    (c) adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed (‘data minimisation’);"

    The purpose here is to protect a particular website from malicious activity. There is nothing relevant in sharing the fact of the visit with a third party (Google) or in otherwise reducing user's privacy (through enforcing JavaScript). So this doesn't minimize the data, on the contrary. To make clear: IP address is personal data, especially in combination with HTTP user agent. So every HTTP request should be processed in a GDPR compliant way.

  • The current challenge system contradicts also Article 6(1)(f) of the GDPR because the "legitimate interest" of the controller is overriding the fundamental right of the data subject, one of which is the right to data protection (defined in Article 8 of the Charter of fundamental rights of the EU). The current challenge system doesn't even give a possibility for consent to data processing beyond what is technically necessary. With JS enabled and without extensions blocking 3rd party requests (e.g. uMatrix) it just instantly shares personal data with Google. The web browser extension of Cloudflare does not resolve the issue because even the very process of installing an extension is additional data processing - totally unnecessary and an additional open door to various vulnerabilities.

A secure, privacy respecting and GDPR compliant challenge system would be simple, secure and privacy respecting. For example: A simple image or text/ASCII-art based captcha without 3rd party HTTP requests, cookies or JavaScript.

====================

****, Apr 11, 9:15 PM PDT

Hi ****,

You mentioned For every circuit without exception tor-curl hits the captcha, can you share with us the rayID you have observed in plain text as well as the zone name where you were running your tests to, so we can help look further at your firewall event logs from there too.

Best regards,

******** | Cloudflare Support Engineer

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

can you share with us the rayID you have observed in plain text

Here are a few Ray IDs. For full command output including IP addresses check the attached file.

4c645a9a3c9358df
4c645ae56d639de5
4c645b317e739cbf
4c645b7d1cfa5ae5
4c645bc30dd3841e
4c645c0d6aa7c67d
4c645c56ad409499
4c645ccb3f11c859
4c645d107e20bf89
4c645d74b90dd113

as well as the zone name where you were running your tests to,

I have given you full STR. I don't know what "zone name" means. Please clarify.

so we can help look further at your firewall event logs from there too.

This is not about anything mine (firewall/sites) but a general issue with all sites which use Cloudflare's challenge mechanism.

$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645a9a3c9358df
    Your IP: 199.249.230.100
$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645ae56d639de5
    Your IP: 185.4.132.135
$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645b317e739cbf
    Your IP: 185.220.101.45
$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645b7d1cfa5ae5
    Your IP: 185.100.86.182
$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645bc30dd3841e
    Your IP: 193.201.225.45
$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645c0d6aa7c67d
    Your IP: 89.234.157.254
$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645c56ad409499
    Your IP: 103.208.220.122
$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645ccb3f11c859
    Your IP: 185.220.101.68
$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645d107e20bf89
    Your IP: 185.220.101.49
$ tornc > /dev/null 2>&1; wait; tor-curl https://cloudflare.com | grep -E 'Your IP|Ray ID' | sed -r 's/<[^>]+>//g'
    Cloudflare Ray ID: 4c645d74b90dd113
    Your IP: 185.220.102.7

====================

****, Apr 14, 8:32 PM PDT

Hi ****,

Zone name is referring to the domain you are running the test to, I understand that you believe this is a wider issue, but we can only discuss with you if you are running test to your own zone(s) and encountering issue, as we can only discuss zone settings with owners.

I would suggest to share with us the rayID that is associated with a zone you own, from there, we can verify the issue and run tests based on your own setting and move on from there

Best regards,

******** | Cloudflare Support Engineer

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

On Mon, 15 Apr 2019 03:32:31 +0000 Cloudflare wrote:

I understand that you believe this is a wider issue, but we can only discuss with you if you are running test to your own zone(s) and encountering issue, as we can only discuss zone settings with owners.

I don't believe - I am showing facts. With the full STR you can reproduce the issue for yourself, with your own zone or with any other zone which has this "challenge" for Tor.

I don't see why you should ignore a wider issue yet suggest assistance for a limited manifestation of it.

====================

****, Apr 15, 7:59 PM PDT

Hi ****,

All rayID is associated with a specific zone, please let us know which zone you are testing with, that will help us with our investigation with the teams.

On the other hand, if these rayID are from your own zone, it can allow us to communicate with you down the road as our goal is to ensure the security and privacy of all our customers, including yourself. We will only be able to discuss in details with the zone owner, and having verify that will definitely allow us to communicate more freely upon checking with our teams.

Best regards,

******** | Cloudflare Support Engineer

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

On Tue, 16 Apr 2019 02:59:06 +0000 Cloudflare wrote:

All rayID is associated with a specific zone, please let us know which zone you are testing with, that will help us with our investigation with the teams.

I have given you complete STR and the result of it. You keep asking for
additional info - there is no such info.

On the other hand, if these rayID are from your own zone, it can allow us to communicate with you down the road as our goal is to ensure the security and privacy of all our customers, including yourself.

There is neither security, nor privacy in a captcha which shares user's IP address (and other details) with Google. I have explained that.

We will only be able to discuss in details with the zone owner, and having verify that will definitely allow us to communicate more freely upon checking with our teams.

The shared STR show that the "zone owner" is you - cloudflare.com. So you have all details to investigate and fix the issue which applies to every site using this captcha system.

====================

****, Apr 16, 5:32 PM PDT

Hi ****,

I think we're just going in circle here and I should have better explain why we would need to focus on your own zone and check from there.

The key is, Cloudflare employees can not remove the captcha. The captcha is showing specifically because of security settings the site owner has turned on, due to whatever setting they might have on their zone, may that be cloudflare.com or any other zones behind Cloudflare.

And as shared, we will not be able to discuss what is the current setting of any zone that is not yours.

To share with you the generic information, a site visitor to a website that Cloudflare is protecting can see a captcha for the following reasons:

  1. The IP address you are on has shown problematic activity online recently in one of our data sources. If you would like to look your IP up, then please look your IP up at Project Honeypot. If the IP address shows data for malicious activity, you can see why there. You can also attempt to whitelist your IP directly on that page by connecting from that IP.

  2. The site owner decided to block the country you are visiting from.

  3. Your actions are triggering a Web Application Firewall (WAF) rule that the website owner has turned on.

What to do:

  1. You can still enter the site by passing the captcha. You can also request to the site owner that the whitelist your IP address. You must have cookies and JavaScript enabled in your browser settings to pass the captcha. If you are running any anti-virus or firewall programs on your computer, then you may also need to check to make sure that they aren't blocking access to the captcha image.

  2. If your IP is showing that you are distributing malware or spam, your computer may have an infection and we would recommend running an anti-virus scan.

Having said that, we will not be able to change the setting of any zone, nor the infrastructure of Cloudflare WAF rule for any specific visitor.

However, if this is your own zone, and you believe you have already got settings that should allow TBB (or any other TOR user) to bypass any challenge but your visitors are still observing difficulties, then, we can make use of the test rayID from your zone, and look further into your firewall setting.

Useful resource

Best regards,

******** | Cloudflare Support Engineer

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

On Wed, 17 Apr 2019 00:32:54 +0000 Cloudflare wrote:

I think we're just going in circle here

I agree.

and I should have better explain why we would need to focus on your own zone and check from there.

I am afraid you are missing the actual big issue here and trying to turn it into a limited (zone) issue, then from that work on fixing the limited issue. Please understand:

This has nothing to do with having a particular country restriction, or specific IP address being marked by Cloudflare (or by a zone owner) as problematic. These factors are generic and common sense. What I am discussing as an issue is an overall pattern which has nothing to do with any of these factors.

To prove that I have recorded for you a screencast showing the actual issue with the same Tor exit node and the same IP address but with different browsers:

[Screencast]
screencast

As you can see - TBB (on the left) opens cloudflare.com, Chromium (on the right) doesn't. There is the Ray ID too.

So:

████ Issue 1 (Tor and browsers)

TBB opens all sites, other browsers face captcha. And that is regardless of the particular IP address of the Tor exit node. Also as demonstrated in the STR earlier: that does not depend on the HTTP request headers.

████ Issue 2 (Captcha implementation)

The key is, Cloudflare employees can not remove the captcha.

But they can make a more privacy respecting captcha which does not:

  • use 3rd party HTTP requests
  • require JavaScript

I hope that clarifies actual primary and secondary issues.

====================

******, Apr 19, 1:24 AM PDT

Hello there

the curl script also hits the captcha.

Just for clarification purpose, are you trying to find a way to use the command line to query via TOR on Cloudflare website without solving the initial Captcha?

Best regards,
Mark
Cloudflare | Senior Support Engineer

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

On Fri, 19 Apr 2019 08:24:11 +0000 Cloudflare wrote:

Just for clarification purpose, are you trying to find a way to use the command line to query via TOR on Cloudflare website without solving the initial Captcha?

I am willing to be able to access through Tor all websites which use Cloudflare with any modern browser without being forced to reduce the privacy of a legitimate visit through:

  • JavaScript
  • cookies
  • sharing the fact of the visit a 3rd party

The curl example was aimed to demonstrate that the captcha doesn't depend on the HTTP request headers.

====================

***** M, Apr 20, 2:56 PM PDT

Hello ****,

Looking back over this issue it appears that Cloudflare's recently released "Onion Service"was meant to address some of your concerns. That is why you don't have issues with the Tor Browser.

https://blog.cloudflare.com/cloudflare-onion-service/

I don't believe that it's been adopted universally, but their are other options we just don't have insight into the status of all of them. And again as **** mentioned this is not something that we control, individual site owners can opt-out of this and specifically block Tor users if they want to.

Again we apologize for any inconvenience, please let us know if you have further questions.

Best regards,

*****- Cloudflare

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

Hi *****,

You guys asked for and received from me quite detailed information and repeated clarifications about the actual issues and the goal.

How exactly does any of the replies given so far provide a practical solution?

You keep repeating that the captcha is a feature which you don't control and it is up to the site owners to enable it or not. But the enabling of the captcha is not the issue here. The issue is the captcha itself - the way it is implemented, the fact that it reduces privacy and all the rest of it (as discussed). So that is something that only you (Cloudflare) are in control of. That is the actual issue here, no what your clients do or not.

====================

***** M, Apr 21, 12:03 PM PDT

Hello ****,

Thanks for clarifying. I do apologize for the privacy trade offs that are involved with use of Google's re-captcha service.

Google's recaptcha is an industry leader and an effective tool for preventing the automated or spam access of sites for many site owners. Unfortunately simple methods are no longer sufficient to inhibit maliscous requests.

For end users with a browser including Tor they can have a secure experience and mitigate user disturbance.

Unfortunately as you noted this does not include all browsers, and can be problematic when not using a browser. This may or may not be the site owner's intent. We can't speak to that, but imagine different cases would have different intent.

We don't strictly enforce the use of any captcha it's strictly up to the site owner's discretion. We now offer our Edge Worker, and apps platform and so users and/or site owners can implement their own solutions for cases where our's don't fit.

https://blog.cloudflare.com/introducing-apps-with-workers/
https://blog.cloudflare.com/tag/workers/
https://developers.cloudflare.com/workers/

Again we apologize for the friction this has caused. I hope that the sites can adjust their configurations and/or assist with adjusting your use-case.

We recommend that you reach out to the administrators for the specific services or sites that you run into issue with and share your experience.

Please let us know if you have further questions or concerns we can assist with.

Best regards,

*****- Cloudflare

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

Hi *****,

Google's recaptcha is an industry leader and an effective tool for preventing the automated or spam access of sites for many site owners.

Google is an industry leader in making technically effective tools to break into everyone's privacy.

We don't strictly enforce the use of any captcha it's strictly up to the site owner's discretion.

It is against the GDPR principles of data protection and minimisation to share data with other parties when it is possible not to do it. So although you may not enforce it, you don't take care to fix it either. It is practically a privacy back door - indeed a very effective one.

Additionally - in the process of enabling it there is no clear warning that informs the enabler that this tool is not GDPR compliant and about the consequences of if for the site visitor.

The final result: you are helping Google, not the web.

Unfortunately simple methods are no longer sufficient to inhibit maliscous requests.

A simple method for the user doesn't necessarily mean a simple implementation. A complex image captcha without 3rd party requests and without JS is surely possible and can work fine. It is also possible to present an animated GIF as a more complex challenge or even an HTML video. None of that requires JS or "industry leaders".

We now offer our Edge Worker, and apps platform and so users and/or site owners can implement their own solutions for cases where our's don't fit.

https://blog.cloudflare.com/introducing-apps-with-workers/
https://blog.cloudflare.com/tag/workers/
https://developers.cloudflare.com/workers/

So to answer the concern that JavaScript is a way to reduce user's privacy you suggest even more JS. Then what's the point of saying:

Please let us know if you have further questions or concerns we can assist with.

?

We recommend that you reach out to the administrators for the specific services or sites that you run into issue with and share your experience.

You speak of effectiveness, yet you suggest the worst possible "solution". I can assure you that nobody is going to contact a few million sites (or even just a few) because of this. I have seen people rage on forums and mailing lists against Clouldflare's recaptcha because of the concerns I am sharing with you. If you really care about the web and not just about corporate interest and industry leadership, you should approach this more seriously, rather than justify it.

If you don't - perhaps this whole communication is a waste of time. I already regret that I wasted a lot of mine just to read more that you are not going to do anything. I realize I am just one of thousands of non-paying users and perhaps of zero importance to you profit-wise. Yet the concerns I am raising are perfectly valid technically and I am quite disappointed that you are ignoring them.

====================

******, Apr 21, 10:12 PM PDT

Hello there

We appreciate the feedback. We take customer suggestions and input seriously and I have forwarded this to the appropriate team for consideration. Thank you again for sharing your ideas with us.

However, at this time, we do not have an immediate resolution for the concern you have brought up.

Best regards,


Cloudflare | Senior Support Engineer

====================

From: **** <>
To: Cloudflare <
>
Subject: Re: [Cloudflare Support] **** - Using Tor without Tor Browser

You are welcome. I hope they will consider fixing it!
Thanks.

====================

***** M, Apr 22, 12:30 PM PDT

Hi ****,

One point of clarification, with Workers the JS runs on our servers not in the browser. It's used because it's a common language for web developer. It doesn't require JS execution on the client.

Thanks again for all your useful feedback please don't hesitate to reach out if you have further questions.

Best regards,

*****- Cloudflare

====================

@tonowoe
Copy link

tonowoe commented Jun 20, 2019

I don't see how this is related to the ungoogled chromium project but I personally appreciate your effort on this issue.

Google's recaptcha is an industry leader and an effective tool for preventing the automated or spam access of sites for many site owners.

Google is an industry leader in making technically effective tools to break into everyone's privacy.

Oof!

@dimyme
Copy link

dimyme commented Jun 20, 2019

wow! seemingly they cannot understand that people just wanna use curl and wget with sites on cloudflare. Instead of clearly stating that that is impossible due to their anti-malicious-actor policy they produce all that verbiage.

I have set up my cloudflare site to max. friendliness to tor users and it works in torbrowser-bundle, but curl always gets the challenge.

Meaning I whitelisted TOR / T1 in the cloudflare-firewall as well as enbled the other onion-related setting: enable Onion Routing in the Crypto app.

To achieve curl compatibility I would have to switch off cloudflare entirely or at least take out those subdomains which I want to have curl-friendly.

Having said that, it already pains me to write here on an M$ site which also introduced pretty gross policies since the takeover. why ungoogle a package then publish via another Big Data actor? seems contradictory...

@grizzlyuser
Copy link

Isn't the issue with curl and ungoogled-chromium in that they do not support .onion alt-svc headers described in the article mentioned by CF employee (https://blog.cloudflare.com/cloudflare-onion-service/) ? Tor Browser does support them, according to the article. If other tools don't, then that's probably why they are handled differently by CF.

@dimyme
Copy link

dimyme commented Jun 20, 2019

indeed cloudflare improved things for users of TBB but not for curl-users.

I also used https://blog.cloudflare.com/privacy-pass-the-math/ privacy pass but havent figured out how I get a benefit from it. have solved tons of bleeding capchas but to no avail.

@dimyme
Copy link

dimyme commented Jun 20, 2019

Beyond applying firewall filters to Tor traffic, Cloudflare users can improve the Tor user experience by enabling Onion Routing.

Onion Routing allows Cloudflare to serve your website’s content directly through the Tor network, without requiring exit nodes required. This improves Tor browsing as follows:

Tor users no longer will access your site via exit nodes, which can sometimes be compromised, and may snoop on user traffic.
Human Tor users and bots can be distinguished by our Onion services, such that CAPTCHA challenges are only served to malicious bot traffic.

You can toggle this setting on or off in the Onion Routing panel of the Cloudflare dashboard Crypto app.

 is this truely an improvement only? 
 why should only normal exit node be malicious, 
 but not the cloudflare exit-nodes (or whatever they call them...)

the onion chain in TBB looks quite normal with an guard and exit node like always.

@grizzlyuser
Copy link

grizzlyuser commented Jun 21, 2019

the onion chain in TBB looks quite normal with an guard and exit node like always.

That's probably due to this issue in TBB, which is also mentioned in that article: https://trac.torproject.org/projects/tor/ticket/27590

@nchv
Copy link
Author

nchv commented Jun 21, 2019 via email

@grizzlyuser
Copy link

But the issue has nothing to do with that. Opening clouldflare.com doesn't show any alt-svc response headers.

After changing circuits in TBB and refreshing a page a few times, it seems like they are available only for some exit nodes.

@nchv
Copy link
Author

nchv commented Jun 21, 2019 via email

@dimyme
Copy link

dimyme commented Jun 22, 2019

they want to make a curl with support for Alt-Svc curl/curl#3498

e.g. try with i.xerx.xyz/222 (https too)

curl --http2 http://example.com/

curl --http2-prior-knowledge http://i.xerx.xyz/222

If you by some chance already know that your server speaks HTTP/2 you can shortcut the HTTP/2 "negotiation" with --http2-prior-knowledge

in TBB hit F12 , network tab ,on https://perfectoid.space/test.php
you can see the h2 business going on:

alt-svc | h2="cflarejlah424meosswvaeqzb5…ion:443"; ma=86400; persist=1
cf-ray | 4eaac56fbc717971-SEA

so they delivered a clearnet website via tor thus gaining a crepload of anonymity...

@bruceleerabbit
Copy link

bruceleerabbit commented Jul 9, 2019

status quo is better

I prefer the status quo. It's useful for Ungoogled Chromium to show the CAPTCHA when entering a CF site because I do not want to be an enabler for those sites by giving them my traffic. The "Attention Required" banner serves as an instant flag to avoid the site. That's actually a service to the users. Circumventing the CAPTCHA would actually help Tor users unwittingly support a privacy adversary.

make it a user-controlled option

If someone makes U/C behave like TB w.r.t CloudFlare, then I would appreciate it if the functionality could be switchable. And if that functionality is enabled, I would hope to still see some kind of indicator that I'm on a site that's normally CF-CAPTCHA encumbered. Note that Firefox has a useful extension that automatically redirects CloudFlared sites to an archived version of the page. We a bit crippled on Chromium-based browsers where that extension does not exist.

fingerprinting

It's also worth noting that Torproject is pushing hard to get everyone on TB because their fingerprinting countermeasure relies on many people using the same TB fingerprint. If U/C fixes #783, it will poach from TB users. At the same time, U/C does nothing to mitigate fingerprinting. So it will hinder Torproject's anti-fingerprinting strategy.

@nchv
Copy link
Author

nchv commented Jul 9, 2019 via email

@bruceleerabbit
Copy link

bruceleerabbit commented Jul 9, 2019

"is better" != "I prefer"
Others may not prefer it.

The status quo is better w.r.t privacy, but worse w.r.t convenience. Users who want convenience choose Google Chromium, not U/C.

Then the question is: do you want to give Google information about the sites you visit?

You've misunderstood. I'm not suggesting going beyond the CAPTCHA. Google does not know what CloudFlare site you're visiting if you do not execute Google's j/s. You see the CAPTCHA frame (for which the puzzle therein is withheld due to not running Google j/s), and you hit control-w. End of story. What you're proposing ruins that and compromises privacy. Users unwittingly feed traffic to CloudFlare.

But when you have JS disabled (as a privacy aware user would, especially through Tor) it is not "avoid" but really block. So it becomes an enforcement for reducing privacy.

It's the other way around. It's accessing the website that compromises privacy (either by running j/s and solving the CAPTCHA, or circumventing the CAPTCHA in order to feed traffic to CloudFlare and feed a privacy abuser).

The "the status quo" (what TBB offers) does not enforce that.

The status quo is for TB to circumvent the CAPTCHA, and for U/C to display the CAPTCHA.

Also it may be more important to the user to be able to access the site rather than avoid it.

That's less secure and it harms everyone. When you feed a privacy abuser (a CloudFlare site in this case), it enables the privacy abuser to thrive and continue to damage everyone.

If a user insists on feeding a privacy abuser, they can use Tor Browser. It's not good, and worse to expand on it by creating more tools to help privacy abusers.

Through Tor it is not such a big privacy issue to visit CF enabled site.

Nonsense. Sharing all traffic including unhashed passwords is a huge privacy issue, most particularly when users don't even know it's going on. It happens without users knowledge or consent. U/C displays an SSL padlock. Most users are mislead by this, and believe they have a secure tunnel all the way to the web ownership (when really the tunnel terminates at CloudFlare). You're advocating to expose more users to that unwitting compromise in a blind way.

Not circumventing it would help Google correlate your visits across websites because Google receives the IP address of your visit through the captcha (without your consent). So if you visit multiple sites, even through Tor, the 3rd party HTTP requests to Google still help fingerprinting. So there are actually 3 issues here:

That's only if you execute Google j/s, which you should not do in the first place.

How do you "poach from users" and what exactly are you poaching?

You poach users by giving them convenience. ATM, Tor Browser is the only way to bypass CF CAPTCHAs. So Tor users who traffic CF sites are limited to TB, but once U/C becomes an option for that use-case, some of them will switch. They will shrink the number of users emitting the shared fingerprint of TB thus increasing uniqueness.

You are wrong. U/C adds specific flags about it. Additionally considering that the user-agent string of Chrome is statistically more popular than that of TBB, I think one may be better with U/C.

No, you do not know how fingerprinting works. It's a collection of metadata and it goes well beyond user agent strings. I cannot give you all the knowledge you need in this post, but very briefly, you cannot simply "add a flag" and make fingerprinting go away. Every browser has a fingerprint and because it's a collection of metadata inherent in a browser's behavior, you cannot eliminate it. What you can do is investigate all the possible pieces of metadata that are usually taken for browser fingerprinting and hardcode the browser to project the same static metadata for all instances of that browser (privacy in numbers). Controlling the user-agent string doesn't even begin to control the problem. It's a huge effort that only TB developers have undertaken. Most importantly, U/C does not protect you from browser fingerprinting in the slightest. By moving users from TB to U/C, you are shrinking the number of users who share the single TB fingerprint, and you're moving them on to a platform that does nothing to control all the fingerprinting variables.

And what is that strategy which cannot be implemented in U/C?

It could be implemented, but it's not. You should implement a static shared fingerprint first before implementing #783.

@Eloston
Copy link
Member

Eloston commented Jul 10, 2019

@bruceleerabbit

It's a huge effort that only TB developers have undertaken

Sounds like you know about this. I'm curious to know what the Tor devs have done; could you describe what changes they've done?

For your reference, ungoogled-chromium currently has these three flags to directly mitigate fingerprinting (from docs/flags.md):

  • --fingerprinting-canvas-image-data-noise (Added flag to Bromite feature) - Implements fingerprinting deception for Canvas image data retrieved via JS APIs. In the data, at most 10 pixels are slightly modified.
  • --fingerprinting-canvas-measuretext-noise (Added flag to Bromite feature) - Scale the output values of Canvas::measureText() with a randomly selected factor in the range -0.0003% to 0.0003%, which are recomputed on every document initialization.
  • --fingerprinting-client-rects-noise (Added flag to Bromite feature) - Implements fingerprinting deception of JS APIs getClientRects() and getBoundingClientRect() by scaling their output values with a random factor in the range -0.0003% to 0.0003%, which are recomputed for every document instantiation.

@nchv
Copy link
Author

nchv commented Jul 10, 2019 via email

@bruceleerabbit
Copy link

bruceleerabbit commented Jul 10, 2019

Using Tor proxy and U/C - how exactly does the captcha page improve your privacy?

It discourages users from accessing a privacy-abusing website. CloudFlare gets less information about users under the status quo than with the convenience feature you're proposing.

The IP address is torified but how does sharing it with Google (through the captcha) improve my privacy? Private means "not shared". So how does sharing more info with more parties give better privacy?

This is a begging the question fallacy. The question itself relies on an bogus assumption.

Google's captcha is an iframe and even with JS completely disabled, loading the page which shows you "Attention Required" still sends an HTTP request to Google = Google knows your IP address

Nonsense.

cf-google

Accessing the site does not compromise privacy when you use Tor proxy. All that Cloudflare will know is the torified IP address and which site it contacted - that is the case with TBB.

You've fallen for the "Tor will keep me safe" blanket misconception. Tor network coupled with various tools will prevent some disclosures of some information in some situations, but when you are on a CloudFlare reverse proxied site CloudFlare sees every single packet, including any unhashed passwords or HTTP PUT form data that you may transmit, and everything you click on, even when you have an HTTPS connection.

When you are blocked from accessing it you have only 2 options:

  • to disable Tor (and expose your real IP address)
  • to enable JS and 3rd party requests to Google

Actually you have omitted the most important option: to walk, which is actually the only privacy conscious option. A CAPTCHA barrier facilitates that choice especially when the CAPTCHA is broken. Suggesting removal of that barrier to send more users traffic to CloudFlare is obviously a lousy idea w.r.t. privacy.

Perhaps your convenience feature would make more sense to implement on the upstream Chromium code or some other Chromium fork where users put convenience above privacy.

Just because you don't want to visit CF sites and want to have an option to be warned that a site uses CF before visiting it does not mean the workaround you use improves anything.

We're talking about user privacy, which is incidentally what I "want". I could just as well say this about what you "want" (convenience). The status quo is better for privacy. You're proposing hiding CloudFlare's very loud presence and at the same time making privacy-abusing websites more functionally convenient, which ultimately leads to more unwitting users feeding more information to a privacy abuser.

This is a statistical fallacy. U/C has far less users than TBB. Those who use U/C + Tor are even less.

It's statistically correct to realize that TB (btw, stop calling it TBB that's an obsolete term) that TB uses a single fingerprint across all instances. Two users of stock TB have the same fingerprint, whereas two users of U/C have distinct fingerprints. Because you cannot guarantee two U/C users have the same fingerprint, you also cannot guarantee that hundred of thousands of U/C users have the same fingerprint. It makes no sense to look at population size of a platform that does not ensure fingerprint uniformity.

Also why are you assuming that switching to U/C would be "increasing uniqueness"?

Uniqueness is a measure of the number of users sharing the same fingerprint. Obviously if fewer users share a common fingerprint, uniqueness of that common fingerprint increases. Uniqueness is indirectly proportional to user count.

Did you even read the explanations I sent to CF and my tests? Or are you simply assuming that you know everything just because you like to keep a workaround which currently gives you a false sense of added privacy?

Actually your cURL example proves my point. The list of headers you've attempted to mimic are insufficient. Your fingerprint differs from that of TB enough for CF to treat your traffic differently. FYI, plugins/extensions are enough to change a browser fingerprint. BTW, your second question again makes use of begging the question fallacy.

@bruceleerabbit
Copy link

bruceleerabbit commented Jul 10, 2019

@Eloston There are a lot of variables to fingerprinting. I've not worked close enough to anti-fingerprinting development efforts to have the whole map of it in my head. It is nice to see that U/C has taken some steps to mitigate fingerprinting. I would look through TB docs and code to review what all they've done. Note as well that TB may be the best for fingerprint masking but it may not be absolute either. Certainly plugins are known to disturb that and create a unique fingerprint. We also know that Tor users are getting deanonymized and we couldn't rule out fingerprinting of variables not controlled.

@nchv
Copy link
Author

nchv commented Jul 12, 2019 via email

@bruceleerabbit
Copy link

bruceleerabbit commented Jul 13, 2019

Similarly you could simply stop using GitHub because it is owned by another big tech - Microsoft. [...] So please kindly stop flooding it with contentious off-topic comments.

Take your own advice. Github is off-topic here but I've opened #795 so you can discuss it in a more appropriate place.

this issue here is about making Cloudflare sites work

It is not the duty of UC to facilitate CloudFlare Inc, work around CF bugs, or ultimately to expand on CF privacy abuses. You have filed your ticket in the wrong place. #783 should not have been filed as an UC issue, and you're the only one to pollute the thread with off-topic content.

You're asking for a convenience feature that compromises the security of all U/C users. The request is inappropriate and to the extent that there is any discussion at all it's quite perverse of you to suggest that discussion of the privacy compromises entailed by your feature request should be silenced as "off-topic". How dare you.

Here is a screenshot that proves it (clean U/C with JS and cookies disabled and no extensions):

Your screenshot only shows that you've failed to prevent google code from executing in your browser (evidenced by the status 200). My capture shows what it looks like when a U/C user properly mitigates google code from executing, and it proves that google contact is avoidable without implementing #783.

As I said: Please open a separate issue if you want to discuss fingerprint reduction.

Do your own homework. It is not my responsibility to put in place preconditions to implementing #783. Why should I? I will however expose missing preconditions that would otherwise compromise everyone's security as a consequence of implementing your reckless and self-entitled feature request. If you don't have the motivation to do what it takes to support your own request, that's your problem.

this issue is not about fingerprinting per se.

Citation needed. Unless you can prove that CloudFlare does not use fingerprinting to accommodate TB sessions you can't rule it out. It's a very likely possibility. Otherwise you've misunderstood CF's motivation behind the CAPTCHA in the first place. If the client-side could be coded to circumvent the CAPTCHA it would defeat CF's anti-bot purpose, as any bot could simply be coded as needed. ATM the only known way to systematically circumvent CF's reCAPTCHA is using Selenium code (or the like) to control a TB instance.

@nchv
Copy link
Author

nchv commented Jul 13, 2019 via email

@bruceleerabbit
Copy link

bruceleerabbit commented Jul 14, 2019

Similarly you could assert that the whole web should be blocked without option for unblocking because big tech companies which abuse privacy also own large network backbones and undersea cables and surely track the IP traffic on it.

That's a fallacy by analogy because the backbone providers are not centralizing just one portion, then blocking access contingent on privacy compromise in exchange for access. Furthermore, even if they were it would still not be the duty of UC to implement a privacy compromise in exchange for convenient access anyway. The analogy is broken no matter how you look at it.

You're asking for a convenience feature that compromises the security of all U/C users.

No. I am asking for an option to be able open CF sites through Tor with UC

Whether it's an "option" or not, it's still a privacy compromise in exchange for convenience nonetheless.

I welcome that option coming with a visual warning and with additional measures to reduce fingerprinting (which itself is a whole separate issue which you didn't open for discussion). Ideally we should be able to have the same or smaller fingerprint than TB + a visual warning. This is my suggestion. Yours so far is: "do nothing and believe in non-facts".

Actually I was the first to state the need to make the feature user-controllable and mindful of the fingerprinting issues -- an idea which you now claim as your own in your goalpost-shifting attempt.

Again: I invited you to open a separate issue to discuss fingerprinting reduction because it is a big one and not specific to Cloudflare only. You didn't do that. Instead you accuse me of "silencing" you and increase the arrogance and aggression in your replies.

Again, do your own homework. It's your problem not mine that #783 is blocked by underdeveloped anti-fingerprinting mechanisms. Every submitter is limited by their own motivation. I've gone as far as to raise lack of anti-fingerprinting as a barrier to #783, given rationale, and I'm content with that level of effort ATM.

Support your own initiative or watch it die.

Your screenshot only shows that you've failed to prevent google code from executing in your browser (evidenced by the status 200).

No. It shows what I said earlier: that Google's recaptcha is an iframe and that a successful HTTP request to Google is made. There is no "code execution" because JS is disabled completely (also visible on screenshot).

Maybe read what HTTP 200 means:

This reply only shows that you don't understand what HTTP 200 means. Obviously if you're successfully connecting to google.com, you've screwed up. As I demonstrated already with my screenshot, if you configure to block google.com j/s no connection to google.com is made on a CF "attention required" landing page. My screenshot proves that (note the status: failed in every row for google.com connections).

@nchv
Copy link
Author

nchv commented Jul 14, 2019

screencast

@nchv
Copy link
Author

nchv commented Jul 15, 2019 via email

@Eloston
Copy link
Member

Eloston commented Jul 16, 2019

@nchv That's a good find. I'll look into it more when I get a chance, but the latest post in the first link seems to suggest it doesn't actually help much...

@nchv
Copy link
Author

nchv commented Jul 16, 2019 via email

@jeames00
Copy link

Regarding curl... have a look at the TLS version and cipher suite that Tor Browser uses when connecting to any https site, then simply replicate this in curl:

curl --http2 -A "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" -v --socks5-hostname 127.0.0.1:9050 --max-redirs 0 --tls-max 1.2 --ciphers ECDHE-ECDSA-AES128-GCM-SHA256 https://www.cloudflare.com

Not a solution for UC, but does address the issue you had with the curl script. Works even without bothering to customise headers (apart from user agent).

@nchv
Copy link
Author

nchv commented Sep 28, 2019 via email

@emanruse
Copy link

emanruse commented Oct 1, 2019

Looking at:

https://www.ssllabs.com/ssltest/viewMyClient.html

it seems the culprit in this issue may be the TLS_GREASE_AA cipher suite which is at the top of "order of preference" for Chromium and cannot be disabled through --cipher-suite-blacklist command line option.

I don't know what role this TLS_GREASE_AA plays (whether it is beneficial or not) but it doesn't appear at all in Tor Browser's cipher suite list.

Perhaps making it possible to disable that cipher (e.g. through a flag) would result in using the other ciphers only which would make it possible to browse Cloudflare sites through Tor.

@Eloston what do you say?

@kramred
Copy link
Contributor

kramred commented Oct 1, 2019

I'm getting various results from TLS_GREASE_2A (0x2a2a), TLS_GREASE_0A (0xa0a), TLS_GREASE_AA (0xaaaa), and so on (via opening new incognito windows) - howsmyssl.com lists e.g. TLS_GREASE_IS_THE_WORD_7A as top entry.

So I looked up what this GREASE is:

GREASE is specifically looking to find servers that don’t deal well with unexpected values. For example, when establishing a connection, the client provides the server with a list of capabilities it supports – for everything from protocol version to cipher suites. If the server does not recognize one of the values the client provides, it should be able to ignore it and successfully start a connection with the best available options.

GREASE will provide a formalized way to get wide-scale and real-world data on where clients and servers are not compatible. “Servers that do not tolerate unknown values will fail to interoperate with existing clients, revealing the mistake before it is widespread.” Remember, the goal of extensibility is to allow the TLS protocol to develop over time and add new functionality without breaking existing implementations.

Read more at: https://www.thesslstore.com/blog/google-wants-grease-chrome/

Chrome Platform Status

TLS clients offer lists of 16-bit code points (e.g. cipher suites) that servers select from. To remain extensible, servers must ignore unknown values. However, servers may have bugs and reject unknown values. These servers will interoperate with existing clients, so the mistake may spread unnoticed, breaking extensibility for the whole ecosystem. We will reserve some values to advertise at random, to prevent such mistakes before broken servers are widespread.
Status in Chromium
Blink components: Blink
Enabled by default (tracking bug) in:

  • Chrome for desktop release 55

So this may not be related to Cloudflare's filtering, or maybe the error is on Cloudflare's end? Or they are deliberately using this to filter traffic (IMHO unlikely)?

I think the TLS GREASE 'feature' in Chromium is unrelated but possibly also unwanted for Ungoogled Chromium as it was intended (presumably by Google) to

get wide-scale and real-world data on where clients and servers are not compatible.

Not sure if Ungoogled Chromium should keep or remove the feature…

BTW: Cloudflare clients can whitelist TOR traffic

Also makes you wonder how privacy-friendly a joint proposal between Cloudflare and Google will turn out to be: The push to QUIC and HTTP/3 has come from two main companies - Google and Cloudflare

@emanruse
Copy link

This is still an issue.
@Eloston is there any hope to have a flag for disabling TLS_GREASE_AA?

@Eloston
Copy link
Member

Eloston commented Feb 16, 2020

@emanruse Sorry for the late response.

I think a flag is the right way to go. Feel free to submit a PR.

@emanruse
Copy link

emanruse commented Feb 16, 2020 via email

@carlob415
Copy link
Contributor

This is my successful patch to make chromium's http requests similar to tor-browser:

--- chromium-96.0.4664.110/content/public/browser/frame_accept_header.cc
+++ chromium-96.0.4664.110/content/public/browser/frame_accept_header.cc
@@ -14,25 +14,7 @@ namespace content {
 
 std::string FrameAcceptHeaderValue(bool allow_sxg_responses,
                                    BrowserContext* browser_context) {
-  std::string header_value = kFrameAcceptHeaderValue;
-
-#if BUILDFLAG(ENABLE_JXL_DECODER)
-  // In case the buildflag and the runtime flag are enables, we insert
-  // "image/jxl," into the header value at the correct place.
-  if (base::FeatureList::IsEnabled(blink::features::kJXL)) {
-    std::string header_value_prefix = header_value.substr(0, 54);
-    std::string header_value_suffix = header_value.substr(54);
-    header_value = header_value_prefix;
-    header_value.append("image/jxl,");
-    header_value.append(header_value_suffix);
-  }
-#endif  // BUILDFLAG(ENABLE_JXL_DECODER)
-  if (allow_sxg_responses &&
-      content::signed_exchange_utils::IsSignedExchangeHandlingEnabled(
-          browser_context)) {
-    header_value.append(kAcceptHeaderSignedExchangeSuffix);
-  }
-  return header_value;
+  return "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8";
 }
 
 }  // namespace content
--- chromium-96.0.4664.110/net/socket/ssl_client_socket_impl.cc
+++ chromium-96.0.4664.110/net/socket/ssl_client_socket_impl.cc
@@ -302,7 +302,7 @@ class SSLClientSocketImpl::SSLContext {
     SSL_CTX_sess_set_new_cb(ssl_ctx_.get(), NewSessionCallback);
     SSL_CTX_set_timeout(ssl_ctx_.get(), 1 * 60 * 60 /* one hour */);
 
-    SSL_CTX_set_grease_enabled(ssl_ctx_.get(), 1);
+    SSL_CTX_set_grease_enabled(ssl_ctx_.get(), 0);
 
     // Deduplicate all certificates minted from the SSL_CTX in memory.
     SSL_CTX_set0_buffer_pool(ssl_ctx_.get(), x509_util::GetBufferPool());

With this patch, all is left is to start chromium with the command-line option --user-agent="Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0". The result is: as expected, cloudflare becomes less interrupting.

@PF4Public
Copy link
Contributor

Is this still an issue?
@carlob415 Does your approach still work?

@PF4Public PF4Public added the need info Need feedback to proceed label Apr 10, 2022
@carlob415
Copy link
Contributor

@PF4Public Yes, cloudflare still gives Tor-browser beneficial treatement in this way. I have been successful with the previously posted patch, I haven't experienced any hickups with clouldflare when using tor since.

This is a simple test using curl:

$ curl https://1.1.1.1 -I -XGET

HTTP/2 403
date: Wed, 13 Apr 2022 22:28:50 GMT
content-type: text/html; charset=UTF-8
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=EvgZDDm26UXLY1Fzt062DVIfKVF7RA%2F43VfWA8ySQqzaMF7OCiLq0Aw4eFNk83uIdiyqF6UWbb6S1d2TaFyzFCYu1C%2FwjTXihZY5sFt7CGtOvQ4ofk%2ByKhg%3D"}],"group":"cf-nel","max_age":604800}
nel: {"report_to":"cf-nel","max_age":604800}
cf-chl-bypass: 1
permissions-policy: accelerometer=(),autoplay=(),camera=(),clipboard-read=(),clipboard-write=(),fullscreen=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires: Thu, 01 Jan 1970 00:00:01 GMT
x-frame-options: SAMEORIGIN
expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
set-cookie: __cf_bm=ORxBDkpNOG_xWmyiIBsz5jdkhvuBBCxNLu60XjXcpD8-1649888930-0-AatASUT2kZiv3nvPkPDVrAc5Gy6rqLfMxxJ8Ove1pi13myVcsfCv/xUu8IKWByYOSu7bCUUv2PxymzsiJrTUopE=; path=/; expires=Wed, 13-Apr-22 22:58:50 GMT; domain=.every1dns.com; HttpOnly; Secure; SameSite=None
server: cloudflare
cf-ray: 6fb7a318de7354a9-YYZ
$ curl https://1.1.1.1 -I -XGET -A 'Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0' -H 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' --tlsv1.3 --tls13-ciphers TLS_AES_128_GCM_SHA256

HTTP/2 200 
date: Wed, 13 Apr 2022 22:28:29 GMT
content-type: text/html
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=GzJOpBZX3dJB0R65clcg%2B4u%2B2QjGQBpH%2BokncgqDBXcTI3EtjmmtEeZTklG5IztVba6WTSZxJa1JXME%2FOOlru9T0RJY5Pulu9l7YfPTxrSE33ncxTheYrhc%3D"}],"group":"cf-nel","max_age":604800}
nel: {"report_to":"cf-nel","max_age":604800}
last-modified: Thu, 31 Mar 2022 18:35:55 GMT
x-rgw-object-type: Normal
x-amz-request-id: tx00000ebb0210041d04de3-0062574c6a-9ef0780-default
strict-transport-security: max-age=31536000
served-in-seconds: 0.003
cache-control: public, max-age=14400
cf-cache-status: HIT
age: 547
expires: Thu, 14 Apr 2022 02:28:29 GMT
expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
set-cookie: __cf_bm=DCDS6tkPUf8CFa.JOkFHAmOxfTkwk3P0gXG3beL7Dfs-1649888909-0-AfOv4s7Hgqf1iY9F/Vf7pEOYka8dPPDnXv7afsnef38C/TTia8Q4SaqbTTYHwLVq53+fiIKjgvNlG4ufCzAEAHU=; path=/; expires=Wed, 13-Apr-22 22:58:29 GMT; domain=.every1dns.com; HttpOnly; Secure; SameSite=None
server: cloudflare
cf-ray: 6fb7a2922ca03ff1-YYZ
alt-svc: h2="cflareusni3s7vwhq2f7gc4opsik7aa4t2ajedhzr42ez6uajaywh3qd.onion:443"; ma=86400; persist=1

@PF4Public
Copy link
Contributor

Is it possible to rewrite this patch to make its effect be configurable by a flag?

@PF4Public PF4Public added enhancement help wanted and removed discussion Not actionable yet; need community feedback need info Need feedback to proceed labels Apr 14, 2022
berkley4 added a commit to berkley4/ungoogled-chromium-debian that referenced this issue Apr 28, 2022
GREASE = Generate Random Extensions And Sustain Extensibility
For more info see - ungoogled-software/ungoogled-chromium#783
@PF4Public
Copy link
Contributor

I hope it is resolved by #1920.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests