-
-
Notifications
You must be signed in to change notification settings - Fork 388
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
webRTC block for PB #332
Comments
I think this would be a pretty good feature, I think that we should probably just outright block third party webrtc and use it to add to the heuristic. We could probably pop up a warning for first party webrtc. I don't know when I iwll have time to get to this so if you want to submit a patch please do! |
The extension linked in this issue is not truly effective at blocking STUN requests (see: https://github.com/diafygi/webrtc-ips), and its protection mechanism is trivially bypassed. Do either of you know of some other avenues that may potentially work? I've done some searching around on the Internet, but at this point I've yet to find anything that looks very promising. I'd be happy to submit a patch for this functionality, but at this point I can't think of any plausible solutions. Thoughts? |
I do not have the knowledge to address this. |
@rbhitchcock I haven't looked into this problem at all so I don't have any good suggestions for you, but that is a really good point. I will look into this problem further. I would be happy to accept a patch if you can come up with a solution! |
uBlock has an experimental fix for leaking IP in WebRTC in chrome: https://github.com/gorhill/uBlock/releases/tag/0.9.9.3-dev.2 Once it is stable, maybe that code can be copied. |
By "private IP address", do you mean a local network IP (192.168.0.0/16 etc) or do you mean a public IP address that's supposed to be VPN'd but isn't? Definitely I'd agree that we should protect against leakage of the former; the latter is a special case that only makes sense to worry about if the user is actually behind a VPN. I suspect that the real underlying problem there is VPNs (including Tor) that don't support UDP, since UDP is what you need to punch P2P through most firewalls. |
In this case, both: the browser reports both to the stun server and makes these available to in-page javascript.
Having the browser report to the STUN server all its IPs hardly improves this, eh? I would say the real underlying problem is the browser reporting it's IPs to the STUN server. The STUN server should decide for itself what the IP of connecting clients are. This is how wikipedia says it works:
https://en.wikipedia.org/wiki/STUN I don't know why it is working so differently in this case. |
The problem is that WebRTC can be used for invisible tracking, bypassing There is also discussion on the W3C PING list It would be good if we can get to a situation where WebRTC can still be used |
to keep the debate in one place lets continue commenting in EFForg/privacybadgerfirefox-legacy#394 |
OK, I was wrong, WebRTC does actually send RFC 1918 addresses to servers. Is that in order to facilitate local network VOIP connections? |
closing this one for now so we can keep the conversation to the other issue, will re-open later |
Request : webRTC Block to be integrated in Privacy Badger
See this site to find out if your browser is giving away your local and public IP address ..
https://diafygi.github.io/webrtc-ips/
See this extension for a solution to the problem ..
https://chrome.google.com/webstore/detail/webrtc-block/nphkkbaidamjmhfanlpblblcadhfbkdm?hl=en
Request similar solution included in Privacy Badger
I understand Firefox has a setting to turn this off, probably defaults to letting it happen, but some chrome browsers notably the current Comodo Dragon leaks this information.
The text was updated successfully, but these errors were encountered: