Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Blocking the IPv6 "Unspecified Address" ([::]) breaks latest NoScript (11.2.13) and other extensions. #11128

Closed
6 tasks done
hackademix opened this issue Dec 29, 2021 · 7 comments

Comments

@hackademix
Copy link

hackademix commented Dec 29, 2021

Prerequisites

I tried to reproduce the issue when...

  • uBO is the only extension
  • uBO with default lists/settings
  • using a new, unmodified browser profile

URL(s) where the issue occurs

https://mozilla.org

Describe the issue

The LAN intrusion blocking filter contains several references to [::], which is the IPv6 Unspecified Address.

This is breaking latest NoScript and other extensions relying on the NoScript Commons Library, such as FSF's jShelter, which use this address as a placeholder endpoint to implement synchronous messages for content script early configuration purposes.

Since this is not meant to be used by any node, either LAN or not, is there any reason not to have it blocked by the filter?
Thanks.

Screenshot(s)

No response

uBlock Origin version

Any

Browser name and version

Mozilla Firefox 96.0b8

Settings

Allowing Filter Lists>Privacy>Block Outsider Intrusion into LAN

Notes

No response

@gwarser
Copy link
Member

gwarser commented Dec 29, 2021

With NoScript you should probably not use the lists because NS is by itself blocking local connections https://noscript.net/faq#qa3_9

If you really need, you can add exception to "My filters" for your specific "[::]" connection by

@@[::]:yourport/and path$domain=from.which.domain

or even badfilter this one filter:

||[::]^$3p,domain=~localhost|~127.0.0.1|~[::1]|~0.0.0.0|~[::]|~local,badfilter

BTW this address is redirecting to localhost, so it's rather not completely safe for random add-ons or libraries to use it freely:

image

@gwarser
Copy link
Member

gwarser commented Dec 29, 2021

Apparently behind-the-scene https://[::]/nscl/moz-extension:// xmlhttprequest allow rule is working1, so maybe exception filter like this will work too:

@@|https://[::]/nscl/moz-extension://$xhr,domain=behind-the-scene

Footnotes

  1. https://forums.informaction.com/viewtopic.php?p=104772#p104772

@hackademix
Copy link
Author

hackademix commented Dec 29, 2021

BTW this address is redirecting to localhost, so it's rather not completely safe for random add-ons or libraries to use it freely:

image

You're right about Chromium, in facts we use file://[::] there, while Firefox correctly treats it as unreachable.

Anyway, I'm thinking to switch the placeholder endpoint to [ff00::], which is a reserved multicast which should be invalid anyway in a HTTP request content (and is regarded as such by both browsers).

@gwarser
Copy link
Member

gwarser commented Dec 29, 2021

You're right about Chromium, in facts we use file://[::] there, while Firefox correctly threats it as unreachable.

Screenshot is from Firefox.

@hackademix
Copy link
Author

Thank you, fixed in NoScript 11.2.14rc1:

v 11.2.14rc1

x [nscl] Updated SyncMessage fixes conflict with other
content blockers (thanks gwarser, barbaz and Baraoic)

@gwarser
Copy link
Member

gwarser commented Feb 8, 2022

@gwarser gwarser reopened this Feb 16, 2023
@gwarser
Copy link
Member

gwarser commented Feb 16, 2023

something wrong with 1.46.0...1.47.0, maybe '• rewrite static filtering parser',
and noscript's xhr from uassets/11128 is losing its 'context: behind-the-scene',
so

@@|https://[ff00::]/nscl/moz-extension:/../syncMessage/$xhr,domain=behind-the-scene

doesn't work


Was

Screenshot_20230216_111808

is

image

Probably because of gorhill/uBlock@6fd58c9

I see no issue on my side. Maybe because it's on Linux.


No issue in VM. Missing important STR?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants