-
Notifications
You must be signed in to change notification settings - Fork 37
Stop circumvention via dynamically created iframes #4
Conversation
Wow that's right -- works just fine, thanks for this. Somehow I had the erroneous idea that child frames were created with same origin (the "inherit URL") as parent document and would be automatically injected into such frames by the browser. |
Just got the new interesting circumvention with iframes.
|
What site? |
Use |
@gorhill it just won't work there as there is no way you can execute a content script inside a |
Relevant bug report: |
I implemented blocking websocket using CSP in 1.9.0, see issue 1936. With |
Hm, I guess you're right, restricting What do you think about something "implicit" and not involving new modifiers? For instance this rule will do the same as your example and stay cross-browser: |
I mean not "will do", just thinking about implementing it this way:) |
You are talking about So.. yes, Just be aware on Firefox, websocket connections are seen as |
Hm, thank you for pointing it out! Btw, does it work for you in FF on aurora and nightly update channels? It seems that WS connections aren't intercepted anymore. |
A bug was opened by ABP dev about this -- if I understand correctly, the issue is only at shouldLoad() observer level, not at HTTP observer level. See https://bugzilla.mozilla.org/show_bug.cgi?id=1299766. These websocket issues contributed a lot of confusion in this issue. |
@gorhill hm, i thought i checked both content policy and http observer, maybe i've missed something. Anyway, thank you for the clarification! It seems they are going to fix it in FF after all. |
Stop circumvention via dynamically created iframes
Here you go, this seems to stop the dynamic iframe circumvention aproach you showed me.
Cheers, Dave.