AdguardForAndroid icon indicating copy to clipboard operation
AdguardForAndroid copied to clipboard

Legitimate HTTPS Requests Blocked

Open jo2dan94 opened this issue 1 month ago • 20 comments

Please answer the following questions for yourself before submitting an issue

  • [x] Filters were updated before reproducing an issue
  • [x] I checked the knowledge base and found no answer
  • [x] I checked to make sure that this issue has not already been filed

AdGuard version

4.14.3

Environment

  • OS version: android 16
  • Device: pixel 10 pro xl

HTTPS filtering

  • [x] yes, I do

Root access

  • [ ] yes, I have it

Integration with AdGuard VPN

  • [ ] yes, I do

Routing mode

Local VPN

Ad Blocking

No response

Privacy

No response

Social

No response

Annoyances

No response

Security

No response

Language-specific

No response

Other

No response

Which DNS server do you use?

DNS protection disabled

DNS protocol

None

Custom DNS

No response

What Stealth Mode options do you have enabled?

No response

Issue Details

na

Expected Behavior

No response

Actual Behavior

not this

Screenshots

Image Image Image Image Image Image Image Image

Additional Information

No response

jo2dan94 avatar Nov 08 '25 04:11 jo2dan94

Image

jo2dan94 avatar Nov 08 '25 04:11 jo2dan94

@Versty how is this issue not fixed. it is easily reproduced by turning on https filtering for any app. it shouldn't be behaving like this.

jo2dan94 avatar Nov 12 '25 01:11 jo2dan94

its blocked multiple legitimate https requests through brave already for me.

jo2dan94 avatar Nov 12 '25 01:11 jo2dan94

I think it's related to the apps and domains using ssl pinning. I've root with certificate installed in system store and yet I face this for various apps with no reason listed in the log. I remember seeing one debug in which something related to ssl was written but I agree this isn't probably true for all the unlisted blocking. Some are because of unsupported protocol too I guess.

Rtizer-9 avatar Nov 15 '25 07:11 Rtizer-9

Similar problem https://github.com/AdguardTeam/AdguardFilters/issues/217996

Alex-302 avatar Nov 17 '25 14:11 Alex-302

#5617?

TPS avatar Nov 27 '25 12:11 TPS

https://github.com/AdguardTeam/AdguardForAndroid/issues/5926

Alex-302 avatar Dec 02 '25 15:12 Alex-302

If HTTPS filtering is enabled for app but app does not accept AdGuard CA, its request will be displayed like this.

sfionov avatar Dec 02 '25 16:12 sfionov

Ok that part is understandable but it is doing it for brave browser sometimes

Sent from Proton Mail for Android.

-------- Original Message -------- On Tuesday, 12/02/25 at 10:32 Sergey Fionov @.***> wrote:

sfionov left a comment (AdguardTeam/AdguardForAndroid#5905)

If HTTPS filtering is enabled for app but app does not accept AdGuard CA, its request will be displayed like this.

— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you authored the thread.Message ID: @.***>

jo2dan94 avatar Dec 02 '25 16:12 jo2dan94

@jo2dan94 could you collect debug logs and send it to qa2adguard.com?

zzebrum avatar Dec 02 '25 16:12 zzebrum

I can. It's just IDK when it's gonna be it happens rarely.

Sent from Proton Mail for Android.

-------- Original Message -------- On Tuesday, 12/02/25 at 10:46 zzebrum @.***> wrote:

zzebrum left a comment (AdguardTeam/AdguardForAndroid#5905)

@.***(https://github.com/jo2dan94) could you collect debug logs and send it to qa2adguard.com?

— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you were mentioned.Message ID: @.***>

jo2dan94 avatar Dec 02 '25 16:12 jo2dan94

send it to qa2adguard.com?

[email protected]?

TPS avatar Dec 02 '25 20:12 TPS

That's where logs are sent yes

Sent from Proton Mail for Android.

-------- Original Message -------- On Tuesday, 12/02/25 at 14:32 TPS @.***> wrote:

TPS left a comment (AdguardTeam/AdguardForAndroid#5905)

send it to qa2adguard.com?

@.***?

— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you were mentioned.Message ID: @.***>

jo2dan94 avatar Dec 02 '25 20:12 jo2dan94

@jo2dan94 Unfortunately, we don’t see any new emails from you. Could you please add 5905 to the subject line and resend it to [email protected]?

Versty avatar Dec 03 '25 13:12 Versty

@TPS @Rtizer-9 @jo2dan94 To summarize the above, blocked 'HTTPS tunnel' events appear when AdGuard tries to filter the HTTPS traffic of an application that does not allow the use of the CA certificate provided by AdGuard. It is also worth mentioning that the HTTPS filtering toggle is disabled for such apps in the 'App Management' tab of the AdGuard application by default.

This behavior is intended, but it would be helpful if you could see a clear explanation of the blocking reason in this case. Therefore, we have created the following enhancement: https://github.com/AdguardTeam/AdguardForAndroid/issues/5942. If you would like to see this implemented, please add a 👍 reaction to the linked issue.

Versty avatar Dec 03 '25 15:12 Versty

It's very hard to reproduce. I don't really have time lately to sit and wait for a blocked https request unfortunately I'm sorry. If someone else could reproduce that would be great

Sent from Proton Mail for Android.

-------- Original Message -------- On Wednesday, 12/03/25 at 07:24 Diana @.***> wrote:

Versty left a comment (AdguardTeam/AdguardForAndroid#5905)

@.(https://github.com/jo2dan94) Unfortunately, we don’t see any new emails from you. Could you please add 5905 to the subject line and resend it to @.?

— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you were mentioned.Message ID: @.***>

jo2dan94 avatar Dec 03 '25 15:12 jo2dan94

I reproduced it tonight. Sending logs. It happened in Samsung browser just a random request that shouldn't have been blocked

Image

jo2dan94 avatar Dec 05 '25 03:12 jo2dan94

Logs sent

jo2dan94 avatar Dec 05 '25 03:12 jo2dan94

Any update. For the easiest testing of this issue, Twitter is the best application which seems to have ssl pinning on several of its domains.

Rtizer-9 avatar Dec 11 '25 16:12 Rtizer-9

Image Image

Two blocked https requests I saw today happened in brave but I didn't get a debug log.

jo2dan94 avatar Dec 13 '25 19:12 jo2dan94

Hello! We will add additional field in the next versions, explaining what's really happened.

@jo2dan94 I have seen your log about execution-ci360.uscellular.com - it is CDN reaction on Protect against DPI - they sometimes manage to respond with error when split ClientHello is on, part of ClientHello is already sent, and second is waiting for delay. However, it can be completely random - your may see successes to the same domain in the same log too.

sfionov avatar Dec 18 '25 15:12 sfionov

@Rtizer-9 @jo2dan94 To summarize said above: this behavior isn’t a bug, but we will make adjustments to improve the indication for such events.

We’ll continue tracking this improvement internally. Thanks for the keen eye!

Versty avatar Dec 18 '25 16:12 Versty

Thank you so much!

Sent from Proton Mail for Android.

-------- Original Message -------- On Thursday, 12/18/25 at 09:53 Sergey Fionov @.***> wrote:

sfionov left a comment (AdguardTeam/AdguardForAndroid#5905)

Hello! We will add additional field in the next versions, explaining what's really happened.

@.***(https://github.com/jo2dan94) I have seen your log about execution-ci360.uscellular.com - it is CDN reaction on Protect against DPI - they sometimes manage to respond with error when split ClientHello is on, part of ClientHello is already sent, and second is waiting for delay. However, it can be completely random - your may see successes to the same domain in the same log too.

— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you were mentioned.Message ID: @.***>

jo2dan94 avatar Dec 18 '25 16:12 jo2dan94

@sfionov @Versty I'm rooted and also make use of ssl pinning bypass modules which sometimes help but not all the time obviously.

On my ksu if "unmount modules by default" is checked, it obviously means that the adguard system certificate installed through adguardcert module won't have any effect at all on apps unless specifically given permissions by allowing modules to mount for that app.

Now even after that various apps get that error of legitimate https requests getting blocked and then I tried granting full root permissions to them to just check and sometimes they seem to work and then sometimes ssl pinning bypass modules work but not perfectly.

So if this is related to the app or a specific domain using ssl pinning then obviously it's not adguard's fault.

As you guys said - for users'convenience, the reason is of utmost importance so they're aware why the request got blocked.

Rtizer-9 avatar Dec 18 '25 16:12 Rtizer-9

Yes I agree. It is important too show in the app why these requests are being blocked.

Sent from Proton Mail for Android.

-------- Original Message -------- On Thursday, 12/18/25 at 10:25 Rtizer-9 @.***> wrote:

Rtizer-9 left a comment (AdguardTeam/AdguardForAndroid#5905)

@.(https://github.com/sfionov) @.(https://github.com/Versty) I'm rooted and also make use of ssl pinning bypass modules which sometimes help but not all the time obviously.

On my ksu if "unmount modules by default" is checked, it obviously means that the adguard system certificate installed through adguardcert module won't have any effect at all on apps unless specifically given permissions by allowing modules to mount for that app.

Now even after that various apps get that error of legitimate https requests getting blocked and then I tried granting full root permissions to them to just check and sometimes they seem to work and then sometimes ssl pinning bypass modules work but not perfectly.

So if this is related to the app or a specific domain using ssl pinning then obviously it's not adguard's fault.

As you guys said - for users'convenience, the reason is of utmost importance so they're aware why the request got blocked.

— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you were mentioned.Message ID: @.***>

jo2dan94 avatar Dec 18 '25 16:12 jo2dan94