Web trackers using CNAME to bypass anti tracking
-
Have you guys seen this?
https://www.theregister.com/2021/03/04/adguard_cname_tracker/
AdGuard on Thursday published a list of more than 6,000 CNAME-based trackers so they can be incorporated into content-blocking filters.
CNAME tracking is a way to configure DNS records to erase the distinction between code and assets from a publisher's (first-party) domain and tracking scripts on that site that call a server on an advertiser's (third-party) domain. Such domain cloaking – obscuring who controls a domain – undoes privacy defenses, like the blocking of third-party cookies, by making third-party assets look like they're associated with the first-party domain.
This blurb doesn't do this issue justice. Because of the use of CNAMEs, the third parties now appear to be a first party subdomain, as such our browser sends them our session cookies for the sites in question.
This is a pretty scary security issue in my opinion.
-
Does pi-hole address this with it's Deep CNAME inspection feature?
-
@Danp said in Web trackers using CNAME to bypass anti tracking:
Does pi-hole address this with it's Deep CNAME inspection feature?
Good question, I don't know.
Apparently uBlock Origin in FF does, but not in Chromium based browsers because FF has a DNS API, and the others don't.
-
@Danp said in Web trackers using CNAME to bypass anti tracking:
Does pi-hole address this with it's Deep CNAME inspection feature?
Looks like the answer is yes. This is how uBlock Origin's works too.
-
Time to move to whitelisting instead.
-
@scottalanmiller said in Web trackers using CNAME to bypass anti tracking:
Time to move to whitelisting instead.
You mean "Allow List "
-
@dbeato said in Web trackers using CNAME to bypass anti tracking:
@scottalanmiller said in Web trackers using CNAME to bypass anti tracking:
Time to move to whitelisting instead.
You mean "Allow List "
They didn't get the memo: