Most active commenters
  • gruez(5)
  • zaphar(3)

←back to thread

Anubis Works

(xeiaso.net)
313 points evacchi | 23 comments | | HN request time: 0.674s | source | bottom
Show context
tripdout ◴[] No.43668552[source]
The bot detection takes 5 whole seconds to solve on my phone, wow.
replies(4): >>43668607 #>>43668678 #>>43668723 #>>43668824 #
1. Hakkin ◴[] No.43668607[source]
Much better than infinite Cloudflare captcha loops.
replies(1): >>43668977 #
2. gruez ◴[] No.43668977[source]
I've never had that, even with something like tor browser. You must be doing something extra suspicious like an user agent spoofer.
replies(3): >>43669011 #>>43669040 #>>43669198 #
3. xena ◴[] No.43669011[source]
Apparently user-agent switchers don't work for fetch() requests, which means that Anubis can't work with people that do that. I know of someone that set up a version of brave from 2022 with a user-agent saying it's chrome 150 and then complaining about it not working for them.
4. megous ◴[] No.43669040[source]
Proper response here is "fuck cloudflare", instead of blaming the user.
replies(1): >>43672933 #
5. praisewhitey ◴[] No.43669198[source]
Firefox with Enhanced Tracking Protection turned on is enough to trigger it.
replies(2): >>43669228 #>>43670028 #
6. gruez ◴[] No.43669228{3}[source]
The infinite loop or the challenge appearing? I've never had problems with passing the challenge, even with ETP + RFP + ublock origin + VPN enabled.
replies(1): >>43669535 #
7. cookiengineer ◴[] No.43669535{4}[source]
Cloudflare is too stupid to realize that carrier grade NATs exist a lot in Germany. So there's that, sharing an IP with literally 20000 people around me doesn't make me suspicious when it's them that trigger that behavior.

Your assumption is that anyone at cloudflare cares. But guess what, it's a self fulfilling prophecy of a bot being blocked, because not a single process in the UX/UI allows any real user to complain about it, and therefore all blocked humans must also be bots.

Just pointing out the flaw of bot blocking in general, because you seem to be absolutely unaware of it. Success rate of bot blocking is always 100%, and never less, because that would imply actually realizing that your tech does nothing, really.

Statistically, the ones really using bots can bypass it easily.

replies(3): >>43671227 #>>43672353 #>>43672910 #
8. aaronmdjones ◴[] No.43670028{3}[source]
You need to whitelist challenges.cloudflare.com for third-party cookies.

If you don't do this, the third-party cookie blocking that strict Enhanced Tracking Protection enables will completely destroy your ability to access websites hosted behind CloudFlare, because it is impossible for CloudFlare to know that you have solved the CAPTCHA.

This is what causes the infinite CAPTCHA loops. It doesn't matter how many of them you solve, Firefox won't let CloudFlare make a note that you have solved it, and then when it reloads the page you obviously must have just tried to load the page again without solving it.

https://i.imgur.com/gMaq0Rx.png

replies(1): >>43671279 #
9. xena ◴[] No.43671227{5}[source]
Honestly it's a fair assumption on bot filtering software that no more than like 8 people will share an IPv4. This is going to make IP reputation solutions hard. Argh.
10. genewitch ◴[] No.43671279{4}[source]
You're telling me cloudflare has to store something on my computer to let them know I passed a captcha?

This sounds like "we only save hashed minutiae of your biometrics"

replies(3): >>43672849 #>>43672901 #>>43675330 #
11. viraptor ◴[] No.43672353{5}[source]
If you want to try fighting it, you need to find someone with CF enterprise plan and bot management working, then get blocked and get them to report that as wrong. Yes it sucks and I'm not saying it's a reasonable process. Just in case you want to try fixing the situation for yourself.
12. zaphar ◴[] No.43672849{5}[source]
Then don't visit the site. Cloudflare is in the loop because the owner of the site wanted to buy not build a solution to the problems that Cloudflare solves. This is well within their rights and a perfectly understandable reason for Cloudflare to be there. Just as you are perfectly within your rights to object and avoid the site.

What is not within your rights is to require the site owner to build their own solution to your specs to solve those problems or to require the site owner to just live with those problems because you want to view the content.

replies(1): >>43676185 #
13. gruez ◴[] No.43672901{5}[source]
>You're telling me cloudflare has to store something on my computer to let them know I passed a captcha?

You realize this is the same as session cookies, which are used on nearly every site, even those where you're not logging in?

>This sounds like "we only save hashed minutiae of your biometrics"

A randomly generated identifier is nowhere close to "hashed minutiae of your biometrics".

replies(1): >>43675361 #
14. gruez ◴[] No.43672910{5}[source]
>Cloudflare is too stupid to realize that carrier grade NATs exist a lot in Germany. So there's that, sharing an IP with literally 20000 people around me doesn't make me suspicious when it's them that trigger that behavior.

Tor and VPNs arguably have the same issue. I use both and haven't experienced "infinite loops" with either. The same can't be said of google, reddit, or many other sites using other security providers. Those either have outright bans, or show captchas that require far more effort to solve than clicking a checkbox.

15. gruez ◴[] No.43672933{3}[source]
It's well within your rights to go out of your way to be suspicious (eg. obfuscating your user-agent). At the same time sites are within their rights to refuse service to you, just like banks can refuse service to you if you show up wearing a balaclava.
replies(1): >>43676767 #
16. aaronmdjones ◴[] No.43675330{5}[source]
> You're telling me cloudflare has to store something on my computer to let them know I passed a captcha?

Yes?

HTTP is stateless. It always has been and it always will be. If you want to pass state between page visits (like "I am logged in to account ..." or "My shopping cart contains ..." or "I solved a CAPTCHA at ..."), you need to be given, and return back to the server on subsequent requests, cookies that encapsulate that information, or encapsulate a reference to an identifier that the server can associate with that information.

This is nothing new. Like gruez said in a sibling comment; this is what session cookies do. Almost every website you ever visit will be giving you some form of session cookie.

17. genewitch ◴[] No.43675361{6}[source]
the idea that cloudflare doesn't know who i am without a cookie is insulting.
18. black_puppydog ◴[] No.43676185{6}[source]
That would be a much stronger line of argument if cloudflare wasn't used by everyone and their consultant, including on a bunch of sites I very much don't have an option of not using.
replies(1): >>43677520 #
19. megous ◴[] No.43676767{4}[source]
You're assuming too much. I'm not obfuscating/masking anything. I'm just using Firefox with some (to the user/me) useless web APIs disabled to reduce the attack surface of the browser and CF is not doing feature testing. It's not just websites that need to protect themselves.

Eg. Anubis here works fine for me, completely out-classing the CF interstitial page with its simplicity.

20. zaphar ◴[] No.43677520{7}[source]
Cloudflare doing a really good job meeting customer needs doesn't impact my argument at all.
replies(1): >>43678137 #
21. fc417fc802 ◴[] No.43678137{8}[source]
When a solution is widely adopted or adopted by essential services it becomes reasonable to place constraints on it. This has happened repeatedly throughout history, often in the form of government regulations.

It usually becomes reasonable to object to the status quo long before the legislature is compelled to move to fix things.

replies(1): >>43680736 #
22. zaphar ◴[] No.43680736{9}[source]
Why? This isn't a contrarian complaint but the problems that Cloudflare solves for an essential service require verifying certain things about the client which places a burden on the client. The problems exist in many cases because the service is essential which makes it a higher profile target. Expecting the client to bear some of that burden for interacting with the service in order to protect that service is not in my mind problematic.

I do think that it's reasonable for the service to provide alternative methods of interacting with it when possible. Phone lines, Mail, Email could all be potential escape hatches. But if a site is on the internet it is going to need protecting eventually.

replies(1): >>43685931 #
23. fc417fc802 ◴[] No.43685931{10}[source]
That's a fair point, but it doesn't follow that the current status quo is necessarily reasonable. You had earlier suggested that the fact that it broadly meets the needs of service operators somehow invalidates objections to it which clearly isn't the case.

I don't know that "3rd party session cookies" or "JS" are reasonable objections, but I definitely have privacy concerns. And I have encountered situations where I wasn't presented with a captcha but was instead unconditionally blocked. That's frustrating but legally acceptable if it's a small time operator. But when it's a contracted tech giant I think it's deserving of scrutiny. Their practices have an outsized footprint.

> service to provide alternative methods of interacting with it when possible

One of the most obvious alternative methods is logging in with an existing account, but on many websites I've found the login portal barricaded behind a screening measure which entirely defeats that.

> if a site is on the internet it is going to need protecting eventually

Ah yes, it needs "protection" from "bots" to ensure that your page visit is "secure". Preventing DoS is understandable, but many operators simply don't want their content scraped for reasons entirely unrelated to service uptime. Yet they try to mislead the visitor regarding the reason for the inconvenience.

Or worse, the government operations that don't care but are blindly implementing a compliance checklist. They sometimes stick captchas in the most nonsensical places.