Post Reply 
prox-config-sidki_2019-01-26b1
Feb. 01, 2022, 09:54 AM
Post: #61
RE: prox-config-sidki_2019-01-26b1
(Feb. 01, 2022 06:23 AM)JJoe Wrote:  Each step up adds more filters and thus potential damage.
The filters added to each level are tagged, l.1 , l.2 , l.3. etc.
Searching for l.3 in the filter editors will show you the filters that are available for level 3.

So, if it works at level 2 but not at 3, you can see the level 3 filters that may be doing damage in the editors and may find the culprits in the log window or the source generated by Debug mode.

I did know that.

I prefer to avoid "levels" because a change from one level to the next could be "dozens" of filters being enabled when the exact keyword is only "half a dozen" filters being enabled.

Thanks again.
Add Thank You Quote this message in a reply
Feb. 02, 2022, 11:39 AM
Post: #62
RE: prox-config-sidki_2019-01-26b1
Here's a web site ( ht tps :// secure.ally . com ) where the <!-- PROX: Bottom Insertion [""''] --> when you use the browser's "Inspect" feature isn't at the actual bottom but in the middle.

At least on first visit, once you refresh/reload, then it moves to the bottom where it is supposed to be.

Everything seems to work fine so unsure if it matters or not.

Any ideas?
Add Thank You Quote this message in a reply
Feb. 02, 2022, 09:45 PM
Post: #63
RE: prox-config-sidki_2019-01-26b1
Another question - are you able to get YouTube to work with Proxomitron?
Add Thank You Quote this message in a reply
Feb. 02, 2022, 11:15 PM
Post: #64
RE: prox-config-sidki_2019-01-26b1
Here's another one - does this page work for you?

https://raybuck.com/firebird-vs-trans-am...ry-trivia/
Add Thank You Quote this message in a reply
Feb. 03, 2022, 12:19 AM
Post: #65
RE: prox-config-sidki_2019-01-26b1
(Feb. 02, 2022 11:39 AM)ProxRocks Wrote:  Any ideas?

This is due to the 'defer' attribute in some of the script tags. The browser is suppose to to run the scripts after the page has been parsed.

That attribute appeared about the same time sidki was finishing up. I don't remember enough to know that it is a problem or not.
Add Thank You Quote this message in a reply
Feb. 03, 2022, 12:22 AM (This post was last modified: Feb. 03, 2022 01:33 AM by JJoe.)
Post: #66
RE: prox-config-sidki_2019-01-26b1
(Feb. 02, 2022 09:45 PM)ProxRocks Wrote:  Another question - are you able to get YouTube to work with Proxomitron?

I think so but I don't spend much time there and never sign in.
I'll check your environment later.

Edit:

Also, seems to work with your environment.
Add Thank You Quote this message in a reply
Feb. 03, 2022, 01:26 AM
Post: #67
RE: prox-config-sidki_2019-01-26b1
(Feb. 02, 2022 11:15 PM)ProxRocks Wrote:  Here's another one - does this page work for you?

https://raybuck.com/firebird-vs-trans-am...ry-trivia/

Kinda but I can't give you a good answer.

So far, I must have the Proxomitron in bypass mode to get past the cloudflare captcha.
Once my browsers 'see' the site 'direct', they move to http2, brotli compression, or maybe some other form of transmission that the Proxomitron can't filter for some of the files, which reduces filtering drastically. If I force things back to The Proxomitron, I'm back to the captcha. I haven't had the time or desire to figure this out yet.

I was a little surprised you could get to offerup without bypass. Guess I could be on another list. Wink
Add Thank You Quote this message in a reply
Feb. 04, 2022, 10:43 AM (This post was last modified: Feb. 04, 2022 10:59 AM by ProxRocks.)
Post: #68
RE: prox-config-sidki_2019-01-26b1
(Jan. 30, 2022 02:25 AM)JJoe Wrote:  What do you see, if you enable 'Bypass Filters' and try to open https://offerup.com/ ?

I can NOT get to offerup, I get the cloudfare captcha.

I can only load offerup if I enable 'Bypass Filters', as you suggested at the time. (But maybe I misread what you meant, to me that meant to hit the button which grays out the web page, header, and freeze gif checkboxes).
Add Thank You Quote this message in a reply
Feb. 04, 2022, 10:44 AM
Post: #69
RE: prox-config-sidki_2019-01-26b1
(Feb. 03, 2022 01:26 AM)JJoe Wrote:  I was a little surprised you could get to offerup without bypass. Guess I could be on another list. Wink

I can not get to offerup without bypass.
Add Thank You Quote this message in a reply
Feb. 05, 2022, 05:38 PM
Post: #70
RE: prox-config-sidki_2019-01-26b1
I split the thread.
Cloudflare discussion is at https://www.prxbx.com/forums/showthread.php?tid=2623
Add Thank You Quote this message in a reply
Feb. 07, 2022, 12:15 AM
Post: #71
RE: prox-config-sidki_2019-01-26b1
https://raybuck.com/firebird-vs-trans-am-history-trivia/ and others hiding behind the Cloudflare captcha.

I think I can get you to the captcha.
You'll have to solve it to move on.

Code:
[HTTP headers]
In = TRUE
Out = FALSE
Key = "Server: Cloudflare 22.02.06     [jjoe] (d.0) (In) [add]`"
Match = "cloudflare &$RESP(403 Forbidden)&$SET(keyword=.a_jsprop.i_loc_j:0.a_jsmeth.)(^)"

Add following patterns to Web Page filters, User Filters section or above. They should be ok for now but a routine would be better.
Filtering will change a file's hash, so we must remove the sha to filter.

Code:
[Patterns]
Name = "<meta> Content-Security-Policy remove sha 22.02.06 [jjoe] (d.1) [ADD]`"
Active = TRUE
Multi = TRUE
URL = "$TST(hCT=*html)"
Bounds = "<meta\s*>( </meta >|)"
Limit = 2000
Match = "(\# 'sha(256|384|512)-*')+{1,*}\#"
Replace = "\@"

Name = "<meta> Content-Security-Policy remove strict-dynamic 22.02.06 [jjoe](d.1)[ADD]`"
Active = TRUE
Multi = TRUE
URL = "$TST(hCT=*html)"
Bounds = "<meta\s*>( </meta >|)"
Limit = 2000
Match = "(\# 'strict-dynamic')+{1,*}\#"
Replace = "\@"

Name = "<meta> Content-Security-Policy local.ptron unsafe 19.03.24 [jjoe] (d.1) [ADD]`"
Active = TRUE
URL = "$TST(hCT=*html)"
Bounds = "<meta\s*>( </meta >|)"
Limit = 2000
Match = "(\#(; report-[^;]+"
        "|((default|script|style|img)-src)\#"
        "$SET(\#= https://local.ptron$GET(lpPort) 'unsafe-inline' )"
        " (\'none\'|)))+{1,*}\#"
Replace = "\@"

Add to Exceptions-U

Code:
hcaptcha.com/[^/]+/api.js  $SET(0=a_jsprop.i_loc_j:0.a_jsmeth.)
newassets.hcaptcha.com/captcha/ $SET(0=a_jsprop.i_loc_j:0.a_jsmeth.)
Add Thank You Quote this message in a reply
Feb. 09, 2022, 11:55 PM
Post: #72
RE: prox-config-sidki_2019-01-26b1
(Feb. 07, 2022 12:15 AM)JJoe Wrote:  https://raybuck.com/firebird-vs-trans-am-history-trivia/ and others hiding behind the Cloudflare captcha.

I think I can get you to the captcha.
You'll have to solve it to move on.

Didn't work here Sad
Add Thank You Quote this message in a reply
Feb. 14, 2022, 01:52 AM
Post: #73
RE: prox-config-sidki_2019-01-26b1
Sorry, just spotted your post.

I do not see the captcha at Raybuck with 360Chrome now. Still a captcha for Opera, however.

When you tried before, did you test with the environment that you uploaded for me?

(Feb. 09, 2022 11:55 PM)ProxRocks Wrote:  Didn't work here Sad
Add Thank You Quote this message in a reply
Feb. 14, 2022, 03:11 AM (This post was last modified: Feb. 14, 2022 03:23 AM by ProxRocks.)
Post: #74
RE: prox-config-sidki_2019-01-26b1
(Feb. 14, 2022 01:52 AM)JJoe Wrote:  When you tried before, did you test with the environment that you uploaded for me?

Yep, same environment I uploaded. (I only use XP.)

Just tried again just now and still not working.

I placed the three web page filters in the "Config Control" section, right below "Join Proxomitron Stylesheets" and above the "Display I" section.

I also tried with these flags added at the end of the Parameters line in the loader.ini but it did not make any difference.
Code:
--enable-local-file-accesses --allow-insecure-localhost --allow-running-insecure-content
Add Thank You Quote this message in a reply
Feb. 15, 2022, 05:20 AM (This post was last modified: Feb. 15, 2022 05:21 AM by JJoe.)
Post: #75
RE: prox-config-sidki_2019-01-26b1
(Feb. 14, 2022 01:52 AM)JJoe Wrote:  I do not see the captcha at Raybuck with 360Chrome now.

#$@^&!!!! who disabled my system proxy setting... Which also explains the unintended, unwelcome, and definitely not wanted windows update I just sat through. Grrrrr.

Anyway, make sure

Code:
[HTTP headers]
In = TRUE
Out = FALSE
Key = "Server: Cloudflare 22.02.06     [jjoe] (d.0) (In) [add]`"
Match = "cloudflare &$RESP(403 Forbidden)&$SET(keyword=.a_jsprop.i_loc_j:0.a_jsmeth.)(^)"

is in place, that the server is cloudflare, and the response is 403 Forbidden.

A way to do this is to open the log window, enable debug and load https://raybuck.com/firebird-vs-trans-am-history-trivia/

We can just https://raybuck.com/firebird-vs-trans-am-history-trivia/?prx-command=dbug..

The headers should be at the top of the page.
If the headers are there, check the page and verify an absence of

<Match: Block/Modify: Sel. JS Properties 07.04.02 [sd] (d.2) >
and
<Match: Block/Modify: Sel. JS Methods 10.09.07 [sd] (d.r) >
Add Thank You Quote this message in a reply
Post Reply 


Forum Jump: