-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Replace user_agent_string with a random string #46
base: dev
Are you sure you want to change the base?
Conversation
Thanks for the experimentation and this insight. I wonder if it would help to use another header, purely to provide a random number for traceability. For example, if we also send |
Force Medtronic to log requests from nightscout-connect. Do not allow plausible deniability. Per nightscout/minimed-connect-to-nightscout#46, force putting a second UUID in a header. x-axios-tracing already sets a UUID. This patch correctly uses browser based headers for processing and requesting HTML Forms.
FWIW, there's a new module, nightscout-connect, with a similar feature discussed here: nightscout/nightscout-connect#19. Nightscout Connect is a bit easier to maintain because 7 vendor libraries can share a single HTTP dependency for Nightscout. It would be great to experiment to see if just 6 - 8 random characters is enough, in addition to strings to correctly attribute the software to our open source projects. |
Looks like they are targetting "nightscout" in the User agent, just removing it also works... |
Thanks for testing @tobiasknudsen. I can confirm any trace of Perhaps we can stick some attribution for NS in another header. |
Fixes #44
It looks like Medtronic has added some rate limiting based on the
User-Agent
on the login endpoints, since they return502
Too Many Connections Requests in 10 minutes
. Hardcoding the User-Agent to a real User-Agent fixes it, but also just sending a random string seems to work for me.Not sure how ideal this fix is