Project

General

Profile

Actions

Feature #284

closed

Silently drop third-party TLS cert errors

Added by Anonymous almost 6 years ago. Updated about 5 years ago.

Status:
Closed
Priority:
Next Release
Start date:
05/16/2018
Due date:
% Done:

0%

Estimated time:

Description

Thank you for making such a great browser! I've been using it for quite some time and have really loved it.

I'm using network-wide DNS blocklists, which causes connections to undesirable sites to be redirected to the firewall. All browsers will then silently drop the traffic because of TLS mismatches. All browsers but Privacy Browser, that is. I'm inundated with tons of errors, each of which require a tap to dismiss. This makes it very difficult to use the browser as sites like Amazon will flood the browser with these requests at regular intervals.

It'd be great if this browser could also silently drop these requests.


Files

Screenshot_20180516-225721.png (245 KB) Screenshot_20180516-225721.png Anonymous, 05/16/2018 10:09 PM
Actions #1

Updated by Soren Stoutner almost 6 years ago

  • Assignee set to Soren Stoutner

I am inclined not to do so as these errors usually indicate a MITM (Man In The Middle) attack, and so it is important for them to be displayed. And this is a Man In The Middle; it just isn't an attack because you have authorized the Man to do so.

Note that you can solve this issue right now by adding the SSL certificate from your blocking server to your Android device:

https://support.google.com/nexus/answer/2844832?hl=en

In the future it will be possible to manage SSL certificates directly inside of Privacy Browser:

https://redmine.stoutner.com/issues/283

You can also solve the problem by having the network-wide DNS blocklist point to an IP address that doesn't respond at all (like 127.0.0.1), instead of one that does and presents an SSL certificate that doesn't match.

And in the future, you will be able to add custom blocklists to Privacy Browser, which will enable you to block whatever you like at the phone level and the requests will never be made (and an error will never be shown):

https://redmine.stoutner.com/issues/181

Actions #2

Updated by Soren Stoutner almost 6 years ago

  • Status changed from New to Closed

By the way, from your screenshot my guess is you are using pfSense with pfBlockerNG (because the certificate is issued by CN_DNSBL). Good taste.

Actions #3

Updated by Soren Stoutner about 5 years ago

  • Priority changed from 2 to Next Release
Actions

Also available in: Atom PDF