-
Notifications
You must be signed in to change notification settings - Fork 776
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Block access to 127.0.0.1/localhost and LAN address from the internet #4318
Comments
@gwarser What do you think about this request ? |
I do not see how this is possible without also blocking the local access of the router via one's browser. |
uBO does not support syntax for IP subnets. This will need to be regular expression filter.
And IPv6, and more custom domains. And websockets? And hope for browsers to normalize to https://en.wikipedia.org/wiki/Dot-decimal_notation and not binary/octa/hexa. https://duckduckgo.com/?q=IP+range+regex&t=ffsb&ia=web Userinfo:
|
Would blocking |
Something can be accessed. I can include image from my 3g modem in webpages. Can be used for tracking/fingerprinting. |
Best is to block this via Dynamic Rules. Use cases for this is like few needles in a haystack. |
needle found: CVE-2024-2883 |
Blocked/restricted. Would "Block Outsider Intrusion into LAN" list prevent this? It's related to https://en.wikipedia.org/wiki/ANGLE_(software) |
Block via dynamic rules or use gwarser's list. |
Related to Pwn2Own? I see a screenshot with local address in https://www.zerodayinitiative.com/blog/2024/3/21/pwn2own-vancouver-2024-day-two-results ( https://www.ghacks.net/2024/04/04/another-google-chrome-0-day-vulnerability-fixed-update-asap/ |
I would suggest to add IPv4 CGNAT 100.64.0.0/10 and IPv6 ULA. |
Hello I suggest blocking all websites on the internet from accessing local resources (localhost/router IP) to prevent the easy exploitation of security vulnerabilitys.
There are many software packages which are running a web server on localhost and if they are not secure they can be attacked from any website. The last bigger issue of this kinde is "logitech Options"
https://bugs.chromium.org/p/project-zero/issues/detail?id=1663
I use Dynamic filtering for some time to block all addresses relevant in my network:
So I prevent other sites from interactions with servers which are running on my system or my router.
But there are some "legitimate" sites which are using access to a local server e.g. Intel Driver update:
https://www.intel.de/content/www/de/de/support/intel-driver-support-assistant.html
So Dynamic filtering is not the best for a general solution.
So a filter list with the possibility of overwriting some site would be better solution.
I don't know the syntax for filter lists sorry therefore no finished list.
I would suggest blocking external access to Private IP addresses and known router host names:
127.0.0.0/8
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
router host names (which work even if the user changes the router IP)
speedport.ip, congstar.box, fritz.box, routerlogin.com, routerlogin.net, samsung.router, easy.box, arcor.easybox
The text was updated successfully, but these errors were encountered: