[MacPorts] #63583: macos-fortress-easylistpac: Safari 15 iOS Bypasses proxy.pac PROXY setting for HTTPS 400 code
MacPorts
noreply at macports.org
Thu Oct 7 02:07:55 UTC 2021
#63583: macos-fortress-easylistpac: Safari 15 iOS Bypasses proxy.pac PROXY setting
for HTTPS 400 code
-----------------------+----------------------------------------
Reporter: essandess | Owner: (none)
Type: defect | Status: new
Priority: Normal | Milestone:
Component: ports | Version:
Keywords: | Port: macos-fortress-easylistpac
-----------------------+----------------------------------------
The PROXY blackhole approach used in port {{{macos-fortress-easylistpac}}}
has stopped working for HTTPS requests on all iOS after updating to Safari
on iOS/iPadOS 15.
Most requests now are HTTPS, so this breaks functionality.
Safari 15 appears to bypass the proxy.pac PROXY and sends requests to
https://unwarranted.tracker.website/?whatever.
I hypothesize the reason is that the proxy returns 400 for such HTTPS
CONNECT requests. Its behavior, expected for HTTPS CONNECT requests,looks
like:
{{{
curl -I --proxy http://my.blackhole.server:8119
https://unwarranted.tracker.website/?whatever
HTTP/1.1 400 Bad Request
Server: nginx/1.21.3
Date: Sat, 25 Sep 2021 19:17:07 GMT
Content-Type: text/html
Content-Length: 157
Connection: close
curl: (56) Received HTTP code 400 from proxy after CONNECT
}}}
The fix appears to be to deprecate this repo and use Privoxy’s HTTPS
inspection along with port {{{adblock2privoxy}}}.
Reference: https://github.com/essandess/easylist-pac-privoxy/issues/21
--
Ticket URL: <https://trac.macports.org/ticket/63583>
MacPorts <https://www.macports.org/>
Ports system for macOS
More information about the macports-tickets
mailing list