Starting Anubis proof-of-work without enabling scripts for entire site #31496
Replies: 3 comments 10 replies
-
Some related discussions/informations here:
I misread a bit your request previously, therefore some other guy has already fixed your exception filters below my comment. In general, blocking that script prevents the website from loading, therefore either it must be allowed, or perhaps it can be bypassed / hacked by some uBO scriptlets or redirection, by the way, the script appears on almost 28000 websites: |
Beta Was this translation helpful? Give feedback.
-
|
The first two exception filters in the uBo/EasyList syntax have mistakes:
Test these in the my filters tab: @@/.within.website/x/cmd/anubis$_,script,inline-script,xhr
@@/.within.website/x/cmd/anubis^$1p,script,inline-script,xhrTo fix the third one, you may want to read: https://github.com/gorhill/ublock/wiki/Dynamic-URL-filtering (when Anubis resources are visible as blocked). Looking at it Eclipse-Community/r3dfox#30, the inserted string is supposedly of type |
Beta Was this translation helpful? Give feedback.
-
That's not the case at all, and I appreciate the discussion.
You are missing my point here, though (or I am not explaining it well enough). Consider the actual user workflow here when you encounter a webpage protected by this thing. Right now, you have to:
Now do this every time you encounter this -- which, if you happen to be browsing search results in a particularly Linux-y subject -- is maybe 60% of all the results? What fun. And you end up with... ...which becomes pretty unwieldy, pretty quickly. It's bad enough for the reCAPTCHA challenges, hCaptcha challenges, Cloudflare challenges, etc. but at least those are coming from relatively-fixed domains and can be managed in a single pass. These blasted things are coming from inside the house. You cannot noop them without nooping the whole site. Whereas one of... ...would be far more manageable. Set once. Never a problem again. If it can't be done, then it can't be done. But I'm still going to register an interest in it.
Fair enough re. dynamic rules. What about a Looking at it from another angle, what about some sort of templating for generating dynamic rules based on patterns, instead of having to trawl through the logger each time one of these gates is raised? The UI could present the pre-configured templates in a dropdown from the same pop-up dialog where the usual temporary overrides are displayed; the user action realises/vivifies the template substituting template values based on the current page, and adds to the list of dynamic rules. The templates would be edited in advance from the dashboard, and would be at the behest of the end-user; I wouldn't expect UBO to ship any pre-written. The performance issue is satiated because the patterns are resolved at edit-time, not per-request. The engine does not need to be changed, because the vivified patterns are just normal dynamic rules. The user workflow is reduced to a couple of clicks (popup, template dropdown, refresh). |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
There is a recently pervasive anti-scraping tool being deployed to certain websites which attempts to make the browser perform a JS-based proof-of-work before entering a website.
However noble that goal, it is deployed directly to the target website, and its artefacts are not served from a dedicated domain, which has the unfortunate side-effect of requiring enabling scripts for the domain of the protected website before one can reasonably evaluate the website content.
If one runs UBO with scripts disabled or with inline/1p/3p-scripts blocked, it renders the target website non-functional. If one enables/unblocks the scripts for the domain, any other script within that domain are unblocked.
In most cases, the specific scripts that would be run are all under a very specific $HOSTNAME/.within.website/x/cmd/anubis/ directory.
Obviously, dynamic rules such as...
example.com https://example.com/.within.website/x/cmd/anubis/static/ script noopexample.org https://example.org/.within.website/x/cmd/anubis/static/ script noopexample.net https://example.net/.within.website/x/cmd/anubis/static/ script noop...work well enough, but are tedious to maintain.
Is there any way to permit/no-op based on URL pattern, without having to duplicate the pattern for each target website?
I thought maybe something akin to one of...
@@||*$path=/.within.website/x/cmd/anubis$_,script,xhr@@/.within.website/x/cmd/anubis^1p,script,xhr* ^.*[/][.]within[.]website[/]x[/]cmd[/]anubis[/].*$ script noop...but I can't seem to get myself all the way there (static filters are observably not my strong suit!).
Beta Was this translation helpful? Give feedback.
All reactions