Skip to content
This repository has been archived by the owner. It is now read-only.

Global QUIC over UDP protocol crimping for ad & privacy protection #6831

Closed
lukemulks opened this issue Jan 24, 2017 · 12 comments
Closed

Global QUIC over UDP protocol crimping for ad & privacy protection #6831

lukemulks opened this issue Jan 24, 2017 · 12 comments

Comments

@lukemulks
Copy link
Collaborator

@lukemulks lukemulks commented Jan 24, 2017

  • Did you search for similar issues before submitting this one?
    Yes

  • Describe the issue you encountered:
    Quic over UDP used by Google to make ads and tracking requests, evades TCP

  • Platform (Win7, 8, 10? macOS? Linux distro?):
    Windows 10 (observed), global (likely)

  • Brave Version (revision SHA):
    0.12.5

  • Steps to reproduce:
    1.wireshark || chrome://net-internals
    2. YouTube
    3.wait for ads

  • Actual result:
    Shows ads and tracking

  • Expected result:
    Blocked ads and tracking

  • Will the steps above reproduce in a fresh profile? If not what other info can be added?
    Y

  • Is this an issue in the currently released version?
    Y

  • Can this issue be consistently reproduced?
    Y

  • Extra QA steps:
    1.
    2.
    3.

  • Screenshot if needed:
    quic-protocol-doubleclick-01222017

  • Any related issues:

@diracdeltas
Copy link
Member

@diracdeltas diracdeltas commented Jan 24, 2017

just to clarify, is this issue for the adblock/tracking-protection components to block QUIC connections to tracking domains or is it to disable QUIC?

@lukemulks
Copy link
Collaborator Author

@lukemulks lukemulks commented Jan 24, 2017

@lukemulks lukemulks changed the title Quic protocol crimping for privacy protection Global QUIC over UDP protocol crimping for ad & privacy protection Jan 24, 2017
@lukemulks
Copy link
Collaborator Author

@lukemulks lukemulks commented Jan 24, 2017

@diracdeltas updated the issue name to clarify. If there are any concerns regarding blocking QUIC globally please let us know. We don't want to cause any issues by blocking QUIC that we may be unaware of, but so far there appears to be little QUIC adoption and use outside of Google, and limited-low QUIC browser support by default outside of Chromium that doesn't include TCP failover.

FWIW, we were discussing globally blocking QUIC as a potential short term option, while we investigate other methods for specific QUIC blacklisting/whitelisting exceptions.

@bridiver
Copy link
Collaborator

@bridiver bridiver commented Jan 24, 2017

we should add a second issue to filter quic connections. @lukemulks is the same thing happening with spdy?

@lukemulks
Copy link
Collaborator Author

@lukemulks lukemulks commented Jan 24, 2017

@diracdeltas
Copy link
Member

@diracdeltas diracdeltas commented Jan 24, 2017

If there are any concerns regarding blocking QUIC globally please let us know.

As you mention, QUIC has low adoption outside of Google, so I don't see any concrete downsides to disabling it. But it seems that we should generally be preventing webRequest bypasses, not disabling the protocols that bypass blocking.

@bridiver
Copy link
Collaborator

@bridiver bridiver commented Jan 24, 2017

@diracdeltas that's why I wanted to open up a separate ticket to filter the requests, but in the short term blocking is fine I think

@bbondy
Copy link
Member

@bbondy bbondy commented Jan 26, 2017

Great find @lukemulks

@luixxiul luixxiul added the privacy label Jan 26, 2017
@luixxiul
Copy link
Contributor

@luixxiul luixxiul commented Jan 26, 2017

Will this be included in 0.13.0?

@luixxiul
Copy link
Contributor

@luixxiul luixxiul commented Jan 26, 2017

@lukemulks would you let us know how to use wireshark for QA process?

@lukemulks
Copy link
Collaborator Author

@lukemulks lukemulks commented Jan 26, 2017

@bridiver
Copy link
Collaborator

@bridiver bridiver commented Jan 26, 2017

@luixxiul I don't think we need further QA for this since @lukemulks has already checked it

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Linked pull requests

Successfully merging a pull request may close this issue.

None yet
5 participants
You can’t perform that action at this time.