Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unable to override default setting for cloudfront.net #2587

Closed
TMarkGibson opened this issue Apr 14, 2020 · 9 comments
Closed

Unable to override default setting for cloudfront.net #2587

TMarkGibson opened this issue Apr 14, 2020 · 9 comments

Comments

@TMarkGibson
Copy link

Recently I was told in the forum that cloudfront.net is already on the yellowlist. I checked and it is, here. On my system there is no entry at all for "cloudfront.net", but there are the two entries of the form "xxxxxxxxxxxxxx.cloudfront.net" which resulted from me making them user-controlled (so the site that keeps generating new random URLs will find them and not create new clutter every time I go there).

How do I merge the current official yellowlist with the one I have changed a bit on my computer? I do not want to overwrite any changes I have made locally, but do want to merge in any new entries from the official list. I am guessing that the default entry for just "cloudfront.net" was somehow overwritten when I was trying to figure out how to locally blacklist that domain entirely and then make exceptions as needed.

I suspect there are many others who would like to be able to merge the current master yellowlist into their local PrivacyBadger installation's version, with the local version always taking precedence. I guess you have your reasons for not letting users maintain their own redlist as well as modified (user-controlled) yellowlist on their local machine and providing a merge function that would allow their local lists to be updated to reflect changes to the master list(s) without entries being stepped on locally.

I hope the above makes sense. It has been many years since I used the terminology related to list maintenance, and I fairly sure the kind of updating merge I am looking for has a name.

@ghostwords ghostwords added yellowlist Domains on this list are allowed but with restrictions: no referrer headers or cookies/localStorage question Further information is requested labels Apr 14, 2020
@ghostwords
Copy link
Member

Hello, and thanks for opening a new issue! Yellowlists should already get automatically updated for all Privacy Badger users. We could try to dig into what's going on here. To start, could you follow steps 2 and 3 of our debugging instructions for "cloudfront.net"? Let me know if you have any questions.

@ghostwords
Copy link
Member

Please refrain from posting on unrelated issues. Let's continue the discussion here where it belongs.

@TMarkGibson
Copy link
Author

TMarkGibson commented Apr 14, 2020 via email

@ghostwords
Copy link
Member

Regarding your question posted elsewhere:

How do I keep a small number of those random third-level domains with [random characters].cloudfront.net URLs that I wish to (partially) allow (set to green or yellow) and have cloudfront.net set to red (black-isted) by default so largre numbers of unwanted third-level cloudfront.net domains do not get marked red and added to the list of user-controlled domains on my computer?

I think this is the crux of it. The reason cloudfront.net itself isn't on the Tracking Domains list is that cloudfront.net is on Mozilla's Public Suffix List, which Privacy Badger uses to decide what is and what isn't a Top Level Domain. Because cloudfront.net is a "private" TLD, it's not on the list the same way as com or org is not on the list.

However, perhaps private TLDs such as cloudfront.net and blogspot.com (#2401 (comment)) should be on the list of tracking domains to allow easy overriding of the default behavior.

We should also perhaps ignore private TLDs on the PSL altogether, and treat them the same as any other domain.

@ghostwords
Copy link
Member

Somewhat related: #2259

@ghostwords ghostwords changed the title local yellowlist management Unable to override default setting for cloudfront.net Apr 14, 2020
@ghostwords ghostwords removed question Further information is requested yellowlist Domains on this list are allowed but with restrictions: no referrer headers or cookies/localStorage labels Apr 14, 2020
@TMarkGibson
Copy link
Author

TMarkGibson commented Apr 14, 2020 via email

@TMarkGibson
Copy link
Author

TMarkGibson commented Apr 22, 2020 via email

@ghostwords
Copy link
Member

ghostwords commented Apr 22, 2020

Regarding "keeping just a small set of pairs of the longer "randomtag".cloudfront.net URLs for use in later sessions, but letting all other variants of cloudfront.net just be blocked."

It sounds like you use other extensions together with Privacy Badger. If any one of your extensions blocks a domain, that domain is blocked everywhere, regardless of the settings of your other extensions. So you should be able to get what you want by configuring one of your other content blockers to block cloudfront.net, and also to allow the few cloudfront.net subdomains you do want.

Once that's done, there is no need to change anything in Privacy Badger, which will continue to cookieblock all cloudfront.net domains that were not blocked by your other blockers.

@TMarkGibson
Copy link
Author

I figured out a dirt simple workaround for the many URLS of the form xxxxxxxxxxxxxx.cloudfront.net that were ending up in the list of trackers that were individually user-controllable in Privacy Badger.

Ghostwords seems to have found the same solution over three weeks ago. I likely would have spotted it months ago but for the fact that I was specifically allowing a few of these RG'd cloudfront.net domains in privacy Badger (PB), NoScript and uBlock Origin, because I often use two or three ad- or tracker-blocker addons simultaneously since doing so does not slow this machine down enough for me to notice and some blockers (think: uBlock Origin) might block specific aspects or elements of the content located at a given URL.

So I did what was suggested about and removed all references to the cloudfront.net domain from the managed sites list of NoSript and PB, then fully blocked cloudfront.net references from booth addons, saved my changed, then added in the very few explicit exceptions I need to use a couple-three sites.

The only detail to remember, as ghostwords mentioned, is to have only one instance of the RG'd domain that is fully blocked in PB when you are done. I am presuming that any blocker which fully blocks a URL will be given priority over some that may look at certain aspects or elements of it or its content to give it at least a partial pass.

I will quit complexifying things now... I should just look at the code as soon as I have a few extra decades of useful life in which to do the many things I am actually expected to do.

Regards,
TMG

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants