Extraneous Product/Version Combinations in User Agent? (ex: Herring/94.1.8750.51, OpenWave/96.4.6033.34)

Recently we have been seeing a very small fraction of requests from Firefox with extraneous product/version combinations in the User-Agent header as well as in navigator.userAgent. They do not appear to be concentrated in a particular part of the world, and we see requests coming from IPs within residential ISP space.

These random product/version combinations take the form <Label> /XXX.X.XXXX.X appended to the end of an expected firefox user agent, for example:

Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:103.0) Gecko/20100101 Firefox/103.0 OpenWave/96.4.8603.4

The labels that we know of are:

  • Agency
  • AtContent
  • Config
  • GLS
  • Herring
  • LikeWise
  • OpenWave
  • Trailer
  • Unique
  • Viewer

A cursory google search for each of the different labels doesn’t bring up any mention of development chatter, or really any mention of this phenomenon at all. However, if you look at a few SEO junk sites listing common User Agent patterns, you can see some of these weird product/version patterns appear, ex: https://whatmyuseragent.com/browser/ff/firefox/103 - meaning that this isn’t happening on a few sites, this is likely happening across the broader internet.

From an external perspective, this could be some smoke test of UA sniffers, similar to TLS GREASE or User-Agent Client Hinting GREASE, but there’s no discussion of this anywhere that I can find. So my question is:

Is this an effort by Mozilla/Firefox Devs?

We’re mainly interested in finding out where this odd phenomenon is coming from, whether it’s from a browser-based experiment, from some strange extension, or from a specific actor.

1 Like

In some cases, this might be caused by Avast AntiTrack or AVG AntiTrack or other security software or proxies. Add-ons might also be implicated.

1 Like

We are seeing exactly the same issue. I have been able to connect to an offending machine, and ascertained that the issue is not in the web-browser. The issue affects Chrome, Edge and Firefox. You can hard-code the UA string in DEV tools, and when you inspect the network traffic in the browser, the UA is transmitted uncontaminated. But by the time it hits the server it has been tampered with. See below:

Transmitted by browser in headers:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36

Request 1 hitting the server:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Trailer/90.3.4112.13

Request 2 hitting the server:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Agency/100.8.3787.88

I think AVG anti-virus is to blame. Once it was removed and replaced with BitDefender or Avast, the problem went away. I’m going to contact AVG now to see if they are the culprit. Hopefully other people will find this post and add to it and we can start to get to the bottom of the issue.

If the UA is used as part of your authentication / security then the change between requests is a real nuisance.

2 Likes

I was looking to find someone discussing this issue. I was nowhere near pinpointing the possible source of this. I’ve had complaints from one of my colleagues that he was constantly being logged out of our back-office… the login uses the userAgent as part of its session fingerprint.

When checking the back-office logs I noticed that he was logging in and then kicked out immediately afterwards because on login the userAgent would have one of those suffixes but for whatever reason would revert to the vanilla userAgent on the next page which would regenerate the fingerprint and upon comparing to the session’s would kick him out.

After a dozen attempts somehow the suffix seems to have stayed in place during and after the login so he’s wasn’t kicked out again, but seems a bit random. I just found out now from what is discussed above, haven’t had the chance to check with him yet, but most probably he has Avast or some other weird software.

In my logs I’ve seen these from the same system, hours/days apart:

  • Trailer/90.3.1672.73
  • Trailer/97.3.5962.63
  • Trailer/91.3.4592.93
  • Herring/95.1.7770.71
  • Herring/93.1.6670.71
  • GLS/92.10.7639.40
  • GLS/93.10.8619.20
  • GLS/97.10.9069.70
  • LikeWise/100.6.6855.56
  • LikeWise/95.6.8655.56
  • Agency/92.8.5317.18
  • Agency/97.8.2227.28
  • Viewer/90.9.3138.39
  • OpenWave/96.4.9653.54
  • AtContent/90.5.8404.5
  • Unique/100.7.3606.7

Maybe this is some kind of privacy protection to confuse tracking? I’m thinking I may filter out, but shouldn’t take long for the suffixes to change, unless they just plan on jumbling the “version” number and nothing else.

After testing we believe this is caused by CCleaner’s Kamo. This is not a Firefox-specific issue; rather, the data is appended to the user-agent of any browser on the system where Kamo is installed.