Manifest V3 doubts? Try a DNS-based solution

Learn how Google Manifest V3 changes may impact anti-tracking and ad blockers and how a DNS solution might be a better option for your enterprise network.

Google claims that the newest version of its Chrome extension platform, Manifest Version 3 (V3), will be more secure, performant, and private than ever.

An extension manifest serves a valuable purpose: It gives a web browser information about an extension, such as key files and capabilities that it might use. According to Google, Manifest V3 represents one of the most significant shifts in the platform since it launched a decade ago.

But Google’s claims have also raised concerns about whether Manifest V3 really improves network privacy and security. Some see an evident conflict of interest between Google as an advertising giant and its Chrome web browser as a user agent.

This post will first touch on the timeline and major changes anticipated for Manifest V3. Then, it will examine what these changes could mean—good or not so good—in the context of your enterprise, particularly for anti-tracking and ad blockers. Finally, it will explore the challenges of merely switching to a different browser and how applying a DNS-based solution might be a better option.

Manifest V3 migration plans

January 2024 was the slated expiration date for Manifest V2 enterprise policy. However, Google has postponed experiments to turn off Manifest V2 and put deprecation timelines under review.

With its expiration, Google’s web store will purge all V2 extensions—including the major ad and tracking blockers. Furthermore, Chrome will no longer run extensions that are not V3 compliant, even those installed with ExtensionInstallForcelist. Certainly, Google could change their plans for V3 during this review process. But assuming they don’t, enterprises using Chrome browsers must confront some hard facts about the security and privacy of their networks.

What Manifest V3 could mean for anti-tracking and ad blocking

Let’s start with the positives. Manifest V3 can protect users from potentially malicious extensions. Most developers would likely agree that blocking the execution of remotely hosted code and arbitrary strings is an overall win from a privacy and security standpoint.

Unfortunately, many of the other changes involve tradeoffs that may result in worse experiences for users and extension developers. Perhaps the most contentious change is the removal of webRequest API calls aimed at blocking HTTP requests. Substantial impacts are expected to the functionality of anti-tracking and ad-blocking extensions by limiting their ability to inspect and modify requests.

A 30,000-rule limit

Moving forward, Chrome browser extensions implementing request blocking functionality will be forced to use declarativeNetRequest instead of the current webRequest present in Manifest V2. This is problematic because there is a 30,000-rule limit for declarativeNetRequest. Meanwhile, there is no such limit to blocking requests using V2’s webRequest.

For context, EasyList alone includes enough rules to hit this limit. But the most effective wide-spectrum content blockers—such as uBlock Origin—require many more domain lists and rulesets to ensure their effectiveness.

Causing more problems than it solves

The ugly truth is that this may cause more problems than it solves. A requirement to submit all extension code for review with V3 can arguably better protect users from malicious extensions. But this only applies if V3-compliant extensions are submitted through Google’s official store.

In practice, those who are determined to subvert advertisements and third-party trackers endemic to many modern web applications typically toggle on developer mode to load up external extensions. But these extensions may be from less-than-reputable sources. And they have the potential to harbor malicious or otherwise insecure code as they avoid Google’s review process. This is, to some extent, a problem that already exists with V2. But the accessibility of fully functional open-source blockers such as uBlock Origin and Ghostery currently mitigates it.

V3 may exacerbate this issue, especially if the impacts to the functionality of these tools are as extensive as expected. Relying on unvetted sources can expose enterprises to a host of security threats.

To avoid Manifest v3, why not just switch browsers?

If you want to keep ad-blocking and anti-tracking functionality, why not simply switch browsers?

In short, many people probably will, but the long story is a bit more nuanced. Switching to another browser may prove to be an effective solution for personal use. But this approach is not necessarily trivial in the context of enterprises, which manage browsers organizationally. Chrome has enjoyed the largest market share of any web browser since it took the top spot in 2012. As a result of this success, it has become entrenched in many enterprises.

Even if your organization chooses to shift away from Chrome, V3 will likely impact other browsers’ design choices to maintain compatibility. Currently, Edge and Safari have confirmed support for V3. Firefox, Brave, and Vivaldi will additionally maintain support for V2-style blocking requests in some capacity.

Block undesired traffic using DNS policy instead

But even outside of switching browsers, all hope is not yet lost.

You can manage and block a substantial amount of ad and third-party tracking traffic at the DNS level. However, this can come at the cost of granularity. For example, it is more straightforward to enact a policy blocking all of youtube.com than it is to target only YouTube’s ads with blocking policies. This especially true in instances where the ad and video share a common source. However, this can be problematic. Categorically blocking a domain may, depending on the situation, be undesirable for the organization, end users, or both.

Overall, if they can handle the complexities effectively, creating consistent, centralized policies to manage network traffic at the organizational level can be a boon to enterprises.

Screenshot of an example dynamic feed domain list in BlueCat Edge.

Indeed, you can configure a domain list in Edge as a dynamic feed to synchronize with a hosted domain list file. This feature can filter out ad and tracking traffic according to popular lists like EasyList and Peter Lowe’s Blocklist. Or it can filter using a custom solution that your organization curates.

Did you know that BlueCat Edge can help your enterprise to block undesired traffic at the DNS level?

Edge dynamic feeds are not the tool for managing ad traffic at the DNS level. Solutions like Pi-hole can be wonderful for personal use.

But nothing else measures up to the robust functionality that Edge delivers. Purpose-built and battle-tested, Edge can scale to fit the needs of your enterprise. Give dynamic feeds a try, especially if you are already an Edge subscriber. We would love to hear about your experience with it!

Contact your BlueCat customer support manager or account executive or visit BlueCat Support today to learn how you can set up dynamic feeds in Edge.


Published in:


An avatar of the author

Jordan Silke is a Data Analyst Developer at BlueCat. He is a lifelong learner interested in the latest trends and technologies in networking and is constantly seeking out new challenges and opportunities for professional development.

Related content

Banner announcing BlueCat's acquisition of LiveAction, displaying both logos and the phrase "We're about to get bigger."

BlueCat acquires LiveAction to drive network modernization and optimization

BlueCat’s acquisition of LiveAction will allow customers to expand their view beyond DNS and dive deeper into the health of their network.

Read more

Simplify NIS2 compliance with DNS management

Learn whether the EU’s NIS2 requirements apply to your organization and about how DNS management and BlueCat can boost your path to compliance.

Read more

Detect anomalies and CVE risks with Infrastructure Assurance 8.4 

The Infrastructure Assurance 8.4 release features an anomaly detection engine for outliers and a CVE analysis engine to uncover device vulnerabilities.

Read more

Get fast, resilient, and flexible DDI management with Integrity 9.6

With Integrity 9.6, network admins can get support for new DNS record types, architect and configure multi-primary DNS, and automate IP assignments.

Read more

BlueCat has acquired LiveAction

It’s official! BlueCat has acquired LiveAction’s network observability and intelligence platform, which helps large enterprises optimize the performance, resiliency, and security of their networks.