TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Document reasoning to block DNS to 127.0.0.1

68 pointsby waplotalmost 2 years ago

11 comments

oefrhaalmost 2 years ago
Not a fan of EasyPrivacy. It seems to be run by trigger happy people with pretty limited understanding of the web.<p>They once blocked workers.dev (Cloudflare Workers) wholesale[1], resulting in a huge flood of issue reports for a few FOSS services of mine. Guess they&#x27;ve never heard of public suffixes.<p>This one appears to be someone reading about DNS rebinding attack somewhere, then pulling the trigger without understanding it. Or maybe I even overestimated them, DNS rebinding only came up as a justification very deep into the discussion.<p>To make matters worse, clients using these block lists have update frequencies all over the place, so you can never be sure when your stuff gets unborked for all your users even after they revert changes like this.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;easylist&#x2F;easylist&#x2F;commit&#x2F;e4b0216">https:&#x2F;&#x2F;github.com&#x2F;easylist&#x2F;easylist&#x2F;commit&#x2F;e4b0216</a>
评论 #36400459 未加载
josephcsiblealmost 2 years ago
This is the explanation given by the person who committed this change:<p>&gt; Is a security issue, imagine if you&#x27;re running a webserver on a site decided to access it from outside, whether to fingerprint you or act nefariously. There should be no reason why a third-party access localhost. But do tell me, why we should we trust sites accessing localhost.<p>It makes no sense to me. Unless someone knows of a better reason, I&#x27;m of the opinion that this change should be reverted.
评论 #36399485 未加载
评论 #36401467 未加载
评论 #36400110 未加载
评论 #36400072 未加载
评论 #36399400 未加载
smitopalmost 2 years ago
Reverted: <a href="https:&#x2F;&#x2F;github.com&#x2F;easylist&#x2F;easylist&#x2F;commit&#x2F;5deb8021949ef22547cb6d0c8bc58692ca3a202e">https:&#x2F;&#x2F;github.com&#x2F;easylist&#x2F;easylist&#x2F;commit&#x2F;5deb8021949ef225...</a>
cookiengineeralmost 2 years ago
While I think that I somewhat agree with their reasoning, someone must also say that we are quickly in multicast territory here.<p>Should websites be allowed to resolve airprint or airdrop based devices, given the history of CSRF vulnerabilities in consumer routers? Probably not.<p>Devs seem to confuse that most humans are not developers, and therefore easylist&#x27;s decision to do so has that kind of context.<p>The point of those lists is to block away access to local domains so a malicious website that got through the filters isn&#x27;t able to pwn your whole network.<p>And if we are discussing whether or not websites should be allowed to access the local network, then you are probably someone who doesn&#x27;t give a damn about securing those devices anyways.
lopkeny12koalmost 2 years ago
I must be in the minority here thinking this move makes total sense.<p>Once I had to apply a firmware update to a device (don&#x27;t remember what it was). I had to install some vendor&#x27;s software but surprisingly the instructions said to then visit a public URL like fwupdate.vendorswebsite.com, which indeed applied the update to my physically connected device.<p>I dug into it and turns out the software launches a local web server listening on localhost which exposes an API that the website accesses over plain CORS HTTP to localhost. This web server talks to the device connected over USB.<p>This felt like an egregious breach of privacy--public websites should not be allowed to arbitrarily exchange data with locally-bound servers. Even though this was the intended design of the firmware update process, my browser really should not have let this occur by default without my explicit opt-in.
kodahalmost 2 years ago
This is pretty unrealistic even given the maintainers example:<p>&gt; Is a security issue, imagine if you&#x27;re running a webserver on a site decided to access it from outside, whether to fingerprint you or act nefariously. There should be no reason why a third-party access localhost. But do tell me, why we should we trust sites accessing localhost.<p>That web server would need to be configured for CSRF and CORS of that specific domain as well. If this were an attacker then it wouldn&#x27;t take long to seize that domain.<p>To fully extrapolate that, the server would only be accessible by the users machine. There&#x27;s no implication of &quot;third party access&quot;. Maybe if they were demanding the website to have a higher classification of verification for their certificate I&#x27;d understand, but frankly without an example of where and how this is a vector I&#x27;m skeptical.
评论 #36400257 未加载
gzer0almost 2 years ago
Has this user’s GitHub account potentially been compromised?<p>The reasoning they give makes no sense; their style of writing also doesn’t match previous commits that they’ve made. Maybe looking too deep into this, but this commit makes absolutely 0 sense and should be reverted.
评论 #36399670 未加载
aeyesalmost 2 years ago
Do they only block 127.0.0.1? If this truly is a security improvement I would like to see an explanation why they don&#x27;t block 127.0.0.0&#x2F;8 instead.
评论 #36400101 未加载
jeroenhdalmost 2 years ago
Annoying, but understandable. There&#x27;s a reason localhost gets special treatment, as do many other local addresses. Local dev sites easily form a fingerprint that you don&#x27;t want trackers to be able to use.<p>I&#x27;m not sure why this applies to first party browsing, though. In its current form (<a href="https:&#x2F;&#x2F;github.com&#x2F;easylist&#x2F;easylist&#x2F;blob&#x2F;master&#x2F;easyprivacy&#x2F;easyprivacy_thirdparty.txt#L2455">https:&#x2F;&#x2F;github.com&#x2F;easylist&#x2F;easylist&#x2F;blob&#x2F;master&#x2F;easyprivacy...</a>) several of these domains got the $third_party modifier which should make CORS fail, and that should resolve most of the fingerprinting risk. I&#x27;m not sure why this isn&#x27;t the default to be honest.<p>That said, if you&#x27;re developing software you should probably be running without any addons like uBlock enabled to prevent surprises in production for your non-uBlock users. Besides that, you can&#x27;t get HTTPS for these domains (without the mess of a custom CA and even then you&#x27;ll run into CT issues) so development doesn&#x27;t even reflect real life deployments. Secure origins matter!<p>Lastly, you can&#x27;t be sure any of these domains won&#x27;t eventually resolve to a real IP address somewhere down the line, unless you own them. They&#x27;re very useful but also very out of your control and that makes them a potential security risk.<p>The workaround should be obvious: add an entry to your hosts file (using either a TLD you own or the proper reserved TLDs (.test, .example, .localhost, .invalid, .home.arpa, and maybe .local though that can conflict with mDNS).<p>If you&#x27;re using Chrome, you can probably use .localhost already, as it resolves those to your local domains for you. Still, adding a *.localhost to your hosts file will ensure that things actually work as intended.
评论 #36399918 未加载
评论 #36399635 未加载
评论 #36399898 未加载
评论 #36399431 未加载
charcircuitalmost 2 years ago
This is not the right way to block domains that resolve to local addresses even if that was something you desired to do.<p>If you know the IP you want to block you should just block on the IP instead of chasing down every possible address even though addresses can change at any time.
评论 #36401167 未加载
ipsum2almost 2 years ago
The issue might be more interesting to read: <a href="https:&#x2F;&#x2F;github.com&#x2F;easylist&#x2F;easylist&#x2F;issues&#x2F;16372">https:&#x2F;&#x2F;github.com&#x2F;easylist&#x2F;easylist&#x2F;issues&#x2F;16372</a>
评论 #36399325 未加载