[MacPorts] #63583: macos-fortress-easylistpac: Safari 15 iOS Bypasses proxy.pac PROXY setting for HTTPS 400 code

MacPorts noreply at macports.org
Thu Oct 7 02:07:55 UTC 2021


#63583: macos-fortress-easylistpac: Safari 15 iOS Bypasses proxy.pac PROXY setting
for HTTPS 400 code
-----------------------+----------------------------------------
 Reporter:  essandess  |      Owner:  (none)
     Type:  defect     |     Status:  new
 Priority:  Normal     |  Milestone:
Component:  ports      |    Version:
 Keywords:             |       Port:  macos-fortress-easylistpac
-----------------------+----------------------------------------
 The PROXY blackhole approach used in port {{{macos-fortress-easylistpac}}}
 has stopped working for HTTPS requests on all iOS after updating to Safari
 on iOS/iPadOS 15.

 Most requests now are HTTPS, so this breaks functionality.

 Safari 15 appears to bypass the proxy.pac PROXY and sends requests to
 https://unwarranted.tracker.website/?whatever.

 I hypothesize the reason is that the proxy returns 400 for such HTTPS
 CONNECT requests. Its behavior, expected for HTTPS CONNECT requests,looks
 like:
 {{{
 curl -I --proxy http://my.blackhole.server:8119
 https://unwarranted.tracker.website/?whatever
 HTTP/1.1 400 Bad Request
 Server: nginx/1.21.3
 Date: Sat, 25 Sep 2021 19:17:07 GMT
 Content-Type: text/html
 Content-Length: 157
 Connection: close

 curl: (56) Received HTTP code 400 from proxy after CONNECT
 }}}

 The fix appears to be to deprecate this repo and use Privoxy’s HTTPS
 inspection along with port {{{adblock2privoxy}}}.

 Reference: https://github.com/essandess/easylist-pac-privoxy/issues/21

-- 
Ticket URL: <https://trac.macports.org/ticket/63583>
MacPorts <https://www.macports.org/>
Ports system for macOS


More information about the macports-tickets mailing list