blokada icon indicating copy to clipboard operation
blokada copied to clipboard

Feature Request: Log which app requested

Open Coasie opened this issue 6 years ago • 20 comments

I like the easy to see log and search of the v4 GUI, one addition I'd really like to see in there, is when you click an entry to open it up, {domain forwarded/domain blocked} I'd really like to see which specific app caused the request.

Coasie avatar Jun 28 '19 16:06 Coasie

Agree! That would be very heplful!

agnus73 avatar Jul 17 '19 03:07 agnus73

This is a much appreciated feature

mosaati avatar Jul 17 '19 13:07 mosaati

Is this even possible without root?

lnicola avatar Jul 19 '19 17:07 lnicola

Showing which app produced connection XY is an awesome idea. Adding to this, it would also be helpful to see all connections per app.

kojid0 avatar Jul 22 '19 11:07 kojid0

This is planned. Feel free to "like" this ticket to let me know how many people is interested so we can prioritise.

kar avatar Jul 25 '19 14:07 kar

I'll go one further, if the request has GET parameters visible, would be great to be able to see those and filter on those. Reason being an app may use one common domain name or basic URL for data including ads, and the differentiator is in the GET parameters. May be trickier if they are in the POST parameters (not visible until after the connection is made).

bernd-wechner avatar Aug 01 '19 03:08 bernd-wechner

Yes, but that's another layer of OSI network design, which we don't operate on yet. It's related to 'cosmetic filtering'.

kar avatar Aug 14 '19 11:08 kar

I was looking for this:). I would like to see which app is using what..It would be also nice to have some additional info/grouping for the blocked domain (advertising/analytics etc.). So I can get some insight about each app. It could also show which apps are using particular tracker.

lbehal avatar Oct 17 '19 08:10 lbehal

Hi, for me this would be my favorite feature from the app, can we see this being on the next to do list?

anibalribeiro avatar Nov 26 '19 22:11 anibalribeiro

Pls add this feature!

thepatrik3 avatar Dec 14 '19 21:12 thepatrik3

This feature is absolutely needed. It would really help people identify apps that need removing and/or disabling, which would result in less filtering needed.

R70YNS avatar Dec 27 '19 23:12 R70YNS

Bad news. Starting with Android 10 access to the info which app created a connection is blocked so until we find a new way to get this information its pointless to implement this feature as it would only support Android < 10.

ps100000 avatar Feb 25 '20 10:02 ps100000

Bad news. Starting with Android 10 access to the info which app created a connection is blocked so until we find a new way to get this information its pointless to implement this feature as it would only support Android < 10.

And yet adguard manages to show that just fine...... On a OnePlus 7 Pro running Android 10

androidacy-user avatar Feb 25 '20 14:02 androidacy-user

Screenshot_20200225-090914 Screenshot_20200225-091045 Also working fine on stock OxygenOS 10.3.1 along with havoc (screenshots from havoc)

androidacy-user avatar Feb 25 '20 14:02 androidacy-user

@linuxandria If your manufacturer still allows access to /proc/net/ you can call yourself lucky or unlucky depending on how you want to look at it. In addition adguard might use something like being a device admin to get more info. I don't know for sure as I'm neither a Adguard-developer nor user but just a hobby-dev doing stuff for Blokada.

ps100000 avatar Feb 25 '20 15:02 ps100000

@anibalcatheringer you are incorrect. AdGuard never requested device admin

androidacy-user avatar Feb 25 '20 15:02 androidacy-user

@ps100000 I do however find it odd for me it works on both a stock and custom ROM. Though why do you even access that? Especially as every packet goes through your tunnel anyhow?

androidacy-user avatar Feb 25 '20 15:02 androidacy-user

AdGuard does however request usage access. I bet that's it

androidacy-user avatar Feb 25 '20 15:02 androidacy-user

@ps100000 I do however find it odd for me it works on both a stock and custom ROM. Though why do you even access that? Especially as every packet goes through your tunnel anyhow?

Because we have to find out which app the package belongs to. There might be some other way. I'll have another look at some point.

ps100000 avatar Feb 25 '20 16:02 ps100000

This would be an incredibly helpful feature. Netguard (https://github.com/M66B/NetGuard) is able to associate requests with specific apps -- no rooting required. Perhaps their source code could be a starting point for figuring out how to implement this in Blokada. I'm not a Java developer, but it looks like the AdapterLog.java might be where this functionality is implemented in Netguard. https://github.com/M66B/NetGuard/blob/297c8b2c3030dff502882f2e2ac215a76a6ec3a3/app/src/main/java/eu/faircode/netguard/AdapterLog.java#L329

jgullickson avatar Oct 15 '21 17:10 jgullickson