Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.
Sign upTwitch.tv - anti-ad blocker, video player (desktop: homepage) #2
Comments
|
@lukemulks you're awesome! |
|
Fixed and confirmed it works with @lukemulks 's rule: I'll upload data files so people will get this within a few hours. |
|
NICE! Thanks @bbondy!
…On Jan 26, 2017 7:52 PM, "Brian R. Bondy" ***@***.***> wrote:
Fixed and confirmed it works with @lukemulks
<https://github.com/lukemulks> 's rule:
||cloudfront.net/esf.js$domain=twitch.tv
I'll upload data files so people will get this within a few hours.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#2 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AIkDKBY8Vg7kc6ykWGKdGvRYiAQZ3XhLks5rWWn2gaJpZM4LvZpg>
.
|
|
@bbondy still working on this issue, as we're both seeing intermittent player blocking. I discovered these two ad requests making it beyond blocking shields. Request 1: This is a custom ad script that Twitch uses, proxied via Fastly: I believe this would be the rule to block the script above. The query string w/the cb= parameter pair passes a random value that works to cachebust the ad request. I left the query string off the rule in this case, but wanted to mention.
Request 2: Google's IMA SDK Adapter (portable - typically included in a creative XML payload in response to an ad request): I was really surprised to see this get by, because this is the call for the Google "portable" IMA SDK Adapter that's typically reserved for the XML manifest served in response to the ad request, and not in the ad request itself. I suspect this may be either a bug, or a Twitch.tv player hack that loads when ad blocking is detected, but am having a hard time confirming if this is the case because when I blacklist it works some, but not all of the time. Easylist has a blocking rule for this already that I suspect should be working, but I'm seeing it in network traffic, and it doesn't appear to be a stub/fake object from a 307 redirect that would be expected w/the gpt.js rule. Easylist already is blocking w/this rule: The request I'm seeing has a query string append that appears atypical: Will put more time in on figuring this out, but wanted to get the above here as an update until I can put fresh eyes on it. |
Migrated from brave/browser-laptop#6872
Issue: twitch.tv video player locks up and displays a black overlay on the video player with shields up.
https://www.twitch.tv
Determined root cause & blacklist-tested:
Twitch.tv is using cloudfront to load a script that detects ad blocking:
https://d2lv4zbk7v5f93.cloudfront.net/esf.jsBlacklist rule that worked (via Charles Proxy blacklisting)
https://cloudfront.net/esf.js
Confirmed that blacklisting using this method of wildcarding around Cloudfront did the trick, and blocking behavior resumed once I removed the blacklisting rule.
@bbondy I believe the blacklist rule I applied in Charles Proxy would translate to the unbreak list as:
@@||cloudfront.net/esf.js$domain=twitch.tv
Happy to review/QA/confirm.
Sorry if this is dense, but would you rather me submit issues and propose fixes in this format, or branch & PR? Not sure what's preferred for these cases. (I come from submitting issues to devs over email behind closed gardens)