add patch tracker scripts response modifier

This commit is contained in:
Kevin Pham
2023-12-01 16:26:59 -06:00
parent cdac75be06
commit 47def5c610
6 changed files with 128 additions and 20 deletions

View File

@@ -85,26 +85,29 @@ func masqueradeAsTrustedBot(botUA string, botIP string, ja3 string) proxychain.R
// general / nginx
SetRequestHeader("X-Forwarded-For", botIP),
SetRequestHeader("X-Real-IP", botIP),
// akamai
SetRequestHeader("True-Client-IP", botIP),
// cloudflare
// TODO: this seems to cause issues with CF... figure out workaround or remove
/*
Error 1000
Ray ID: xxxxxxxxxxxxxxxx •
2023-12-01 20:09:22 UTC
DNS points to prohibited IP
What happened?
You've requested a page on a website (xxxxxxxxxxxxxxxxxxx) that is on the Cloudflare network. Unfortunately, it is resolving to an IP address that is creating a conflict within Cloudflare's system
*/
SetRequestHeader("CF-Connecting-IP", botIP),
// weblogic
SetRequestHeader("WL-Proxy-Client-IP", botIP),
// azure
SetRequestHeader("X-Cluster-Client-IP", botIP),
/*
// akamai
SetRequestHeader("True-Client-IP", botIP),
// cloudflare
// TODO: this seems to cause issues with CF... figure out workaround or remove
Error 1000
Ray ID: xxxxxxxxxxxxxxxx •
2023-12-01 20:09:22 UTC
DNS points to prohibited IP
What happened?
You've requested a page on a website (xxxxxxxxxxxxxxxxxxx) that is on the Cloudflare network. Unfortunately, it is resolving to an IP address that is creating a conflict within Cloudflare's system
SetRequestHeader("CF-Connecting-IP", botIP),
// weblogic
SetRequestHeader("WL-Proxy-Client-IP", botIP),
// azure
SetRequestHeader("X-Cluster-Client-IP", botIP),
*/
DeleteRequestHeader("referrer"),
DeleteRequestHeader("origin"),

View File

@@ -0,0 +1,99 @@
package responsemodifers
import (
"embed"
"encoding/json"
"io"
"ladder/proxychain"
"log"
"regexp"
)
//go:embed vendor/ddg-tracker-surrogates/mapping.json
var mappingJSON []byte
//go:embed vendor/ddg-tracker-surrogates/surrogates/*
var surrogateFS embed.FS
var rules domainRules
func init() {
err := json.Unmarshal([]byte(mappingJSON), &rules)
if err != nil {
log.Printf("[ERROR]: PatchTrackerScripts: failed to deserialize ladder/proxychain/responsemodifers/vendor/ddg-tracker-surrogates/mapping.json")
}
}
// mapping.json schema
type rule struct {
RegexRule *regexp.Regexp `json:"regexRule"`
Surrogate string `json:"surrogate"`
Action string `json:"action,omitempty"`
}
type domainRules map[string][]rule
func (r *rule) UnmarshalJSON(data []byte) error {
type Tmp struct {
RegexRule string `json:"regexRule"`
Surrogate string `json:"surrogate"`
Action string `json:"action,omitempty"`
}
var tmp Tmp
if err := json.Unmarshal(data, &tmp); err != nil {
return err
}
regex := regexp.MustCompile(tmp.RegexRule)
r.RegexRule = regex
r.Surrogate = tmp.Surrogate
r.Action = tmp.Action
return nil
}
// PatchTrackerScripts replaces any request to tracker scripts such as google analytics
// with a no-op stub that mocks the API structure of the original scripts they replace.
// Some pages depend on the existence of these structures for proper loading, so this may fix
// some broken elements.
// Surrogate script code borrowed from: DuckDuckGo Privacy Essentials browser extension for Firefox, Chrome. (Apache 2.0 license)
func PatchTrackerScripts() proxychain.ResponseModification {
return func(chain *proxychain.ProxyChain) error {
// preflight checks
reqURL := chain.Request.URL.String()
isTracker := false
var surrogateScript io.ReadCloser
for domain, domainRules := range rules {
for _, rule := range domainRules {
if !rule.RegexRule.MatchString(reqURL) {
continue
}
// found tracker script, replacing response body with nop stub from
// ./vendor/ddg-tracker-surrogates/surrogates/{{rule.Surrogate}}
isTracker = true
script, err := surrogateFS.Open("vendor/ddg-tracker-surrogates/surrogates/" + rule.Surrogate)
if err != nil {
panic(err)
}
surrogateScript = io.NopCloser(script)
log.Printf("INFO: PatchTrackerScripts :: injecting surrogate for '%s' => 'surrogates/%s'\n", domain, rule.Surrogate)
break
}
}
if !isTracker {
return nil
}
chain.Response.Body = surrogateScript
chain.Context.Set("content-type", "text/javascript")
return nil
}
}