-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
woob.browser.exceptions.ClientError: 403 Client Error: Forbidden #296
Comments
Hi, What is the content of Try to remove the file and run doctoshotgun again. |
Hi, state.json seems to be populated with the cookies: {"cookies": "eJwlj1tT...bQvGTjTqWPoLk+9k6N/0dp+IJ2BsH+w5s/urajLmiomtcgbZ03KG0qS8Y6JpY15IfxEQIfTnokXnPX4wvjcEoa7i/gv1RYK+Pn8BcrBToI="} |
Can you run doctoshotgun with -d and paste all the output? |
here is the output : 2021-11-30 11:16:05,776:DEBUG:browser::browsers.py:1056:_load_cookies Reloaded cookies from storage |
when connecting with a new browser on doctolib url, there is a puzzle captcha to access the site. |
wtf |
I get the same error ├╴ Spécifiez votre situation: 1 |
It just worked, maybe the cookie was not valid anymore |
Changing my @ip with a VPN, captcha is no more requested, and the script is working again. So I guess a captcha protection is activated when doing to much requests to doctolib. |
Hello. Commenting even after issue closure. I am running in the same issue, except that I don't have a VPN at hand. Strangely, I can successfully log into the same account and use the doctolib web portal with a browser. I hope this is just a temporary ban, and that the cooldown is not too long. |
Unfortunately I can't reproduce. I guess once you resolved the captcha, a cookie is set to prove you are not a bot. What kind of captcha is it? If possible the best thing would be to redirect you in the browser when it occurs to let you resolve the captcha by hand, and enter a callback uri or something like that in doctoshotgun. |
I still have the captcha when opening doctolib in a new browser (even in the phone app). The protection seems to be activated on my @ip. |
if you open doctolib in a new private browsing window, the captcha will be required each time. |
I had the same captcha challenge.
I suppose once an IP is suspicious, any connection without a "human" cookie is challenged.
Another workaround would be to transfer whatever cookies attest the captcha-challenge success to the script store. |
I just looked at the captcha wall, no apparent redirection. This feature seem specifically designed to prevent what this project is doing. I analysed the challenge and found details by other people's experience here that it is going to be a tricky issue (emphasis mine):
There do is a request at the end that yields a cf_clearance token ("cf" as CloudFlare of course), which could be retrieved by a tech-savvy user. I don't know if the 1k request limit is going to pose an issue. @rbignon as you suggested, the script could do the following:
Maybe that issue should be re-opened until this is implemented? |
i reopen the issue |
In woob we support anticaptcha, I'll try to use it in doctoshotgun, but it requires to subscribe to the service. However, what you suggest seems fine, but I don't get captcha here, can you try to do a PR? |
I got a captcha challenge by running the script while already logged and active in my browser. But otherwise, I'll try to implement this soon and send a PR if someone does not beat me to it. Side note: The conversation about CloudFlare challenges I linked to refers to a "Privacy Pass" feature.
I don't know if that can be of any use in that matter. |
OMG, I just took a look at that anti-captcha website…
-__- |
It turns out the CF challenge bypass is much trickier than I hoped (more reseach). I have commited some work on my fork branch. I can reproduce the issue by using the tor network (quite some bad reputation IPs there). So I don't see any solution for the moment. |
FYI @rbignon I have noticed one weird thing: When using the I suppose it's a issue of its own, but I'm unsure of my analysis. |
Hm, we use the |
Maybe Cloudflare performs TLS fingerprinting? |
I have this new error every time i start the script.
Maybe an issue with 2FA ?
The text was updated successfully, but these errors were encountered: