uBlockOrigin / uAssets

Resources for uBlock Origin, uMatrix: static filter lists, ready-to-use rulesets, etc.
GNU General Public License v3.0
3.96k stars 744 forks source link

login.deutsche-rentenversicherung.de: breakage #23388

Closed zWhdmB5T closed 4 months ago

zWhdmB5T commented 4 months ago

Prerequisites

URL address of the web page

https://login.deutsche-rentenversicherung.de/realms/DRV/broker/eid/login

Category

breakage

Description

Title: Block Outsider Intrusion into LAN Description: Prevents public internet sites from digging into your local LAN files.

Filter ||localhost^$3p,from=~0.0.0.0|~127.0.0.1|~[::1]|~[::]|~local|~localhost
Filterliste Block Outsider Intrusion into LAN
Kontext login.deutsche-rentenversicherung.de
Zugehörigkeit(3) deutsche-rentenversicherung.de ⇒ localhost
Typ websocket
URLws://localhost:24727/eID-Kernel 

Other extensions used

LocalCDN I don't care about cookies IndicateTLS

Screenshot(s)

Screenshot(s)

Configuration

```yaml uBlock Origin: 1.57.2 Firefox: 124 filterset (summary): network: 240673 cosmetic: 100819 scriptlet: 41759 html: 2030 listset (total-discarded, last-updated): added: adguard-generic: 80958-3919, 6m adguard-mobile: 9260-56, 6m adguard-spyware-url: 1494-120, 6m block-lan: 61-0, now curben-phishing: 13993-2, now ublock-annoyances: 6886-74, 6m Δ dpollock-0: 11669-440, now adguard-spyware: 88051-29149, 6m default: user-filters: 0-0, never ublock-filters: 37699-109, 6m Δ ublock-badware: 8317-0, 6m Δ ublock-privacy: 830-1, 6m Δ ublock-unbreak: 2313-2, 6m Δ ublock-quick-fixes: 241-21, 6m Δ easylist: 86192-1660, 6m Δ easyprivacy: 50791-164, 6m Δ urlhaus-1: 13070-0, now plowe-0: 3736-1591, now DEU-0: 7401-53, now filterset (user): [empty] trustedset: added: [array of 6 redacted] hostRuleset: added: [array of 66 redacted] userSettings: contextMenuEnabled: false hiddenSettings: [none] supportStats: allReadyAfter: 206 ms (selfie) maxAssetCacheWait: 121 ms cacheBackend: indexedDB popupPanel: blocked: 16 network: localhost: 16 ```
JobcenterTycoon commented 4 months ago

The eID trying to connect to the installed eID app. Other example request: http://127.0.0.1:24727/eID-Client?Status=json on https://organspende-register.de/erklaerendenportal/registrierung?auswahl=ABGEBEN

Technical: https://www.ausweisapp.bund.de/fuer-diensteanbieter/leitfaden/technische-hinweise

JobcenterTycoon commented 4 months ago

@gwarser

zWhdmB5T commented 4 months ago

With block-list "Block Outsider Intrusion into LAN" enabled, I am able to run successfully with my (German) eID card:

but that one does not work due to a filter (I now set a specific exclusion on my side): Deutschen Rentenversicherung

(I have an exclusion for the last entry, but not for the three above…)

further details:

gwarser commented 4 months ago

I don't know how to reproduce. (geolocked?)

This will work?

@@||localhost^$from=login.deutsche-rentenversicherung.de
JobcenterTycoon commented 4 months ago
  1. Open https://kundenportal.deutsche-rentenversicherung.de/
  2. It will redirect to a optionsmenu. Select "(eID)".
  3. Scroll down and click on "Registrieren"

Now the site trying to connect to the eID app with a localhost URL ws://localhost:24727/eID-Kernel but Block Outsider Intrusion into LAN blocks the requests.

zWhdmB5T commented 4 months ago

I don't know how to reproduce. (geolocked?)

This will work?

@@||localhost^$from=login.deutsche-rentenversicherung.de

I set it more detailed: @@||localhost:24727/eID-Kernel$websocket,domain=login.deutsche-rentenversicherung.de … but, yes

zWhdmB5T commented 4 months ago

for this issue and similar ones: this site Personalausweisportal - Anwendungensuche lists providers for German eID card services… maybe, there are some more not working without specific exclusions — I haven't tested all of them, just the ones I need myself as listed above (maybe some more in future)

JobcenterTycoon commented 4 months ago

I whitelisted a few more already https://github.com/uBlockOrigin/uAssets/commit/5aa03658027796c3ffae75f3d5be4989fa611da3 problem is a generic whitelist filter would punch holes inside the blocklist which can be exploited by every site for fingerpring or attacking purposes.

zWhdmB5T commented 4 months ago

Would @@||localhost:24727/eID-Kernel$websocket be to generous? (just a humble question — maybe this suggestion is silly…) Otherwise, actually every specific domain has to be provided, indeed, as it is yet. Well, German eID support is growing slowly, i.e. not so many domains to add, maybe (depends on users reporting errors).

For comparison: why didn't I get blocked (it worked without specific user exclusion) at Führungszeugnis resp. Führungszeugnis ? (humble question, but interested, I just don't know…)

zWhdmB5T commented 4 months ago

For comparison: why didn't I get blocked (it worked without specific user exclusion) at Führungszeugnis resp. Führungszeugnis ? (humble question, but interested, I just don't know…)

Oh sorry, I didn't get that it's bund.de as the domain — I was confused because bund.de is just the main domain, but in this case with added subdomain. sorry!

bund.de , indeed, should apply to several cases. :-)

But then, obviously, quite some domains have to be added to whitelist to filter list, haven't they. Probably, not many people use uBlock WITH this specific filter list AND German eID service login (probably more issues otherwise).

JobcenterTycoon commented 4 months ago

Every site can try to connect to the local IP/hostname and port. This is why the Block Outsider Intrusion into LAN blocklist got created, it blocks access to local ressources by sites which are not local. This is why the list is disabled by default because uBO can't differ between "good" and "bad" requests (except for specific whitelist filter).

I searched a bit and i see the government site mv-serviceportal.de is also commonly used. Added to the whitelist now. https://github.com/uBlockOrigin/uAssets/commit/9b1c6358dc502c265cf788630f42d3010388fdd9

@gwarser

@@||127.0.0.1^$domain=~intel.cn|~intel.co.id|~intel.co.jp|~intel.co.kr|~intel.com|~intel.com.br|~intel.com.tw|~intel.de|~intel.fr|~intel.la|~intel.vn

from https://github.com/uBlockOrigin/uAssets/commit/a316bca5909f704dbfbf3d5a5eaa7d2808d623d2 looks wrong. It allows every site a connection to 127.0.0.1 except intel sites.

gwarser commented 4 months ago

I should probably go through the PR way next time :\