Adguard - Ad Blocker

Discussion in 'other software & services' started by Tyrizian, Mar 2, 2013.

  1. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,080
    Location:
    DC Metro Area
    Stealth Mode has not been enabled. Cuz it has a greyed-out check mark I had assumed it was enabled by default.

    What type of background job would require constant use 24/7 ??\

    v. 6.1.331.1732
     
  2. guest

    guest Guest

    you can't enable it? (see screenshot)

    no idea, maybe @avatar may explain us.


    btw, all my favorite sites are either on TLS 1.2 or no SSL at all. So Adguard is still good to me. As if i will ditch blocking ads and securing my traffic because few sites (i don't even visit) are using TLS1.3... no way.
     

    Attached Files:

    • ADG.jpg
      ADG.jpg
      File size:
      137.6 KB
      Views:
      12
    Last edited by a moderator: May 6, 2017
  3. guest

    guest Guest

    malwaretips where you are staff uses both SSL & TLS 1.3. So, going by your statement it ain't one of your favorite site :p

    Also, as already told it's not just about TLS(which btw is a huge component in itself).
     
  4. avatar

    avatar Developer

    Joined:
    Jan 18, 2014
    Posts:
    1,048
    Huh, I apologize, but these are alternative facts.

    The current state of things:
    https://www.openssl.org/blog/blog/2017/05/04/tlsv1.3/

    * As of the time of writing TLSv1.3 is still in draft.
    * OpenSSL 1.1.1 will not be released until (at least) TLSv1.3 is finalised.
    * Currently OpenSSL has implemented the “draft-20” version of TLSv1.3. Many other libraries are still using older draft versions in their implementations. Notably many popular browsers are using “draft-18”. This is a common source of interoperability problems.

    On the server-side one can easily experiment with different TLS versions as you can promptly upgrade/update it if a problem emerges. Things are not that easy on a client-side as updating software takes quite some time.

    So, what you call an urgent issue is that AG does not currently support the experimental protocol.

    I'd like to point out a few things about it:
    1. TLSv1.2 does not lower your security at all. TLSv1.3 is all about performance and not about security as every security improvement it brings was already covered on the client side (compression and insecure ciphers are no more used).
    2. Even Chrome beta does not support it yet, simply because it is still a draft.

    That's true in general for any product which filters HTTPS.

    That's why there are websites like ssllabs, which help you understand is everything okay with https:
    https://www.ssllabs.com/ssltest/viewMyClient.html

    It is quite okay to have it enabled.
     
    Last edited: May 7, 2017
  5. avatar

    avatar Developer

    Joined:
    Jan 18, 2014
    Posts:
    1,048
    It is not an HDD writes/reads. Service communicates with the driver through a virtual device which looks like IO read/writes in the task manager.
     
  6. guest

    guest Guest

    it is what i guessed, i saw on a table comparing the different features, TLS1.3 had nothing new in term of security compared to TLS1.2
     
  7. avatar

    avatar Developer

    Joined:
    Jan 18, 2014
    Posts:
    1,048
    Let's continue the discussion about HTTPS filtering in general.

    First of all, this is all about your control over your data.

    Let's imagine a situation when HTTPS is completely "unfilterable" (as Google tries to do on Android for instance).

    1. Would it improve your security in any way?

    Maybe it would, but just a bit. There are a couple of products with flawed https filtering implementation, which considerably lowers HTTPS security. It's worth noticing, though, that those products are already marked as vulnerable by major AVs. So, this vector will be completely eliminated and 0.0001% of users will be now secure.

    2. It would improve my privacy as nobody can snoop on me, right?

    Yeah, nobody. Even you won't be able to snoop on yourself. The apps installed on your device, your browsers, they all become a complete black box for you in the first place. You will never learn what exact data is being sent over to their servers, you will never be able to control it. So, the answer is NO, having a completely secured and encrypted end-to-end channel is not good at all for your privacy.

    3. So, is filtering HTTPS a good thing after all?

    The answer is NO, again. It is not a good thing, and we do it because there is no better solution. Instead of doing our job and looking for better ways to block tracking and ads, we have to spend quite some time racing after the browsers, securing https filtering and arguing about TLSv1.3.
     
  8. guest

    guest Guest

    Try to monitor Disk I/O to see actual hard disk-access, not regular I/O
    For some programs constant I/O can be seen, but this doesn't mean that it is actual hard disk-access.
     
  9. CHEFKOCH

    CHEFKOCH Registered Member

    Joined:
    Aug 29, 2014
    Posts:
    395
    Location:
    Swiss
    TLS 1.3 is a working draft which means it's already done but smaller changes can still happen. Since internet has changed this is time of things and it's good otherwise you sit on a timebomb because 'final' doesn't exist anymore - We saw what happened if someone use 'final' products, attackers have all the time to abuse vulnerabilities. I consider this as final since only new function are changed not the backward compatibility ones. The new OpenSSL is only required for the new ciphers, cloudflare already use this and they saying it's an huge step forwards the security.

    This is wrong too, and shows AdGuard Devs. having no clue what they talking about. TLS 1.3. is a huge step, they remove old and deprecated ciphers (which e.g. are reasonable to attacks like BEAST, Lucky 13 and others). Entire RC4 stream cipher function will be obsolete. SHA1 for the hash-function is also replaced by SHA-2. That there exist already SHA1 attacks is proven by google.

    That's a lie. Chrome does support TLS 1.3 since (final Chrome v56+) and it's enabled by default. Firefox got it since v52. You can check it with your mentioned page here.

    Don't get me wrong but this is urgent, you as developer use an excuse now. The draft exist now years and no work was done in AdGuard or showing people a warning. You spread wrong and false information here.

    When HTTPS is not a good thing why AdGuard offer this function - instead warn user and remove the function.

    It's is new, speed and security are enhanced a lot.
     
  10. guest

    guest Guest

    It's like saying http and https site offer the same security :facepalm:

    TLS 1.3 not only is faster but is more secure over TLS 1.2 itself(forget even the comparison with http/unencrypted sites). A quick google search will show you the mechanism at work in TLS 1.3 and why its being touted as faster and secure over TLS 1.2

    If there is a http version and https version of a site- what would you prefer? Most of us sane person would say the later. The same is true when comparing TLS 1.2 and TLS 1.3.(Some people have https everywhere addon in their setup *cough*)

    Wow, and what source would that be?

    Forget about beta even stable version of major browser supports TLS 1.3
     
  11. guest

    guest Guest

  12. CHEFKOCH

    CHEFKOCH Registered Member

    Joined:
    Aug 29, 2014
    Posts:
    395
    Location:
    Swiss
    @the commissionier
    Maybe AdGuard dev should read my cloudflare link, it even links and explains what it really changes and improves. There are two big factors security and speed. But I give up here, for me that are excuses because they not want accept that they provide (useless) functions/features which none of the own developers are able to handle correctly. Instead they making it worse with lies and confusing statements and GitHub edits.

    When it comes to http/https security you have to use latest versions especially because even stable Browser release and enable such features by default - it was not even mentioned or warned by AdGuard devs that it use as fallback a 'weaker' tls/ssl then. This was all in background and without users knowledge. I expect transparency when a tool intercept in my traffic.

    I already did, here again just for you my friend. And another link.

    AGAIN wikipedia IS NOT A SOURCE. They referred links are sources but not the wikipedia page itself - because everyone can write/edit everything in it.
     
    Last edited: May 7, 2017
  13. guest

    guest Guest

    TLS and encrypted connections have always added a slight overhead when it comes to web performance. HTTP/2 definitely helped with this problem, but TLS 1.3 helps speed up encrypted connections even more. To put it simply, with TLS 1.2, two round-trips have been needed to complete the TLS handshake. With 1.3, it requires only one round-trip, which in turn cuts the encryption latency in half. This helps those encrypted connections feel just a little bit snappier than before.
    Another advantage of is that in a sense, it remembers! On sites you have previously visited, you can now send data on the first message to the server. This is called a “zero round trip.” (0-RTT). And yes, this also results in improved load time times.


    kinsta.com


    There are other sources as well but this explains it well and easy for all to understand. Hence, the statement that TLS 1.3 is not only faster but more secured as well.
     
  14. guest

    guest Guest

    ok i see , more secure by removing obsolete protocols and encryption methods, i thought they added things. thx.
     
  15. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    8,027
  16. CHEFKOCH

    CHEFKOCH Registered Member

    Joined:
    Aug 29, 2014
    Posts:
    395
    Location:
    Swiss
    @Comish
    Please can you check/verify this. Sorry I don't believe that. I already had my doubts when the developer answered when it came to the questions 'why adguard.exe needs constantly i-net connection'.
    I also will do later some tests cause virtual device should communicate in memory.

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    That's why I was saying for me the 'it's a working process draft' sounds like an excuse. Google uses Draft 18 for TLS 1.3. and I expect as an 'stable' Chrome/Chromium user that AdGuard stay in line/sync with such 'important' changes. Instead the Developer using this as argument now to not supporting it, the user without bigger knowledge never gets warned or an information. That is (for me) a no go.

    AdGuard offers and feature here which is very very important (if enabled) and it needs a lot of changes and improvements. I now want to hear xyz it maybe only gets smaller changes we not support do anything here. I want to hear solutions or warnings that 'we are working on it'. I (personally) think AdGuard needs more man-power because such things aren't things for only one or two people , it needs experts.

    My last words on this, I recommend (again) everyone to NOT use/disable SSL filtering in AdGuard (for now). That is in name of security. Not because I want to complaining about AdGuard (I'm long time tester here) it's to inform people.

    This little example shows how dangerous it is to trust third-party developers/tools/software when it comes to security/filtering.
     
    Last edited: May 7, 2017
  17. guest

    guest Guest

    Sorry, can't - disabled Adguard for now. I have found a bug which causes Adguard (in WFP mode) to crash the system whenever you would visit a https encrypted site. And its not related to TLS 1.3 before the guys try and bow me down. :p
     
  18. avatar

    avatar Developer

    Joined:
    Jan 18, 2014
    Posts:
    1,048
    So it is a draft after all, why saying otherwise?

    RC4 and SHA1 are deprecated for a while and not used by modern browsers.

    That was my point, all the security improvements you can mention are already covered by the browsers no matter what TLS version you use. Calling TLSv1.2 (or even TLSv1.0) insecure is just wrong. It is true that you can use it in an insecure manner, though.

    Not really, they rolled it back. I guess you can enable it with a chrome://flag, though.

    OpenSSL guys have already pointed out that differences between draft 18 and draft 20 may lead to compatibility issues (connections hanging for instance). That's why we won't enable 1.3 by default unless it is finalized.

    Why, who said that we are not working on it? What I said is that we won't enable it by default unless it is released.

    We've decided to get rid of different programming languages zoo and have a single core library implementing all the crucial functionality, which will be reused by all the products. You can keep track of the issues in a separate repo: https://github.com/AdguardTeam/CoreLibs
     
  19. avatar

    avatar Developer

    Joined:
    Jan 18, 2014
    Posts:
    1,048
    Antivirus not able to scan HTTPS is quite weird. HTTPS won't protect you from malware or phishing attacks and it in no way improves trust to a website. Nowadays literally anybody can acquire a certificate for their domain.
     
  20. guest

    guest Guest

    This debate is not a big deal , few sites are TLS1.3 , and if they are, AdG users just have to add them to the HTTPS exclusions. So there is no valid reason to disable HTTPS filters in AdG, especially when some sites like Wilders doesn't even use SSL/TLS. Better TLS1.2 than nothing.
     
  21. Dragon1952

    Dragon1952 Registered Member

    Joined:
    Sep 16, 2012
    Posts:
    2,470
    Location:
    Hollow Earth - Telos
    Why all those https exclusions in AGFW.
     
    Last edited: May 7, 2017
  22. avatar

    avatar Developer

    Joined:
    Jan 18, 2014
    Posts:
    1,048
    To emphasize that we care about your important financial and personal data and not want to filter it.
     
  23. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    8,027
    Antivirus not able want to scan HTTPS.
     
  24. avatar

    avatar Developer

    Joined:
    Jan 18, 2014
    Posts:
    1,048
    So, what does that antivirus plan to do with malware/phishing https websites?

    Also, I am well aware of the research and what it points out is that besides browsers, HTTPS implementation should be inspected and improved in all the products which do scan HTTPS, and which were previously ignored for no reason.
     
  25. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    8,027
    We cover malware detection with other technologies like FileGuard and the AUC based URL protection in the ABS extension contributes to your protection. AV scanning may also be incorporated into our Scout Browser in the future if we see a security benefit there.

    Given the recent test results (Avira just won AV-Comparatives Product of the Year award), the lack of interception has visibly not hurt Avira’s ability to provide top-level security. Please take a look at the report footnotes on page 4 for the names of other AV firms that are not doing interceptions.


    https://blog.avira.com/evil-nasty-https-handshakes/
    -------------
    https://www.avira.com/en/press-details?nid=1142&news=best-in-class-protection-for-your-digital-life
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.