Account Locked and Pi-Hole
tldr: pi-hole (and other firewall products using blacklist filtering) can break quicken login forms. They appear to work, but will not accept a good password. Try disabling your pi-hole.
Hello, I am posting this here in case others have the same problem. And also, to hopefully gain attention of a quicken developer who can fix this issue on their end. Because ultimately, this is not a problem with pi-hole, or any of the other anti-virus/firewall products quicken wants you to disable. It's a problem with Quicken infrastructure.
The problem I experienced:
- I was unable to log in to Quicken for several days.
- Entering the correct password, stored in my password manager, failed.
- Failed attempts locked the account.
- I reset the password, but was still unable to log in, even after waiting days for the supposed account lock to lift.
- Login form displayed the message Your Account is Locked, Try Again later. Turns out, this error message is displayed improperly, instead there was a network communication problem. This misleading and improperly displayed error message only compounds the problem and confusion, both for the customer and for Quicken phone support.
Calls with Quicken Support
- The support reps were perplexed
- If I entered an obviously bad password, their system logs recorded a failed login attempt
- If I entered the right password, their system logs did not record a login attempt, failed or successful
- The support reps were unusually obsessed with questions about windows firewall or virus scanner products.
Disabling my pi-hole fixed the login form
- The login form on their website, and embedded in the windows application, is interfered with by pi-hole.
- Some internet host it's connecting to is in a public malware/virus block list. The pi-hole, and other firewall products using that block list presumably, therefore break the login form.
- The login form displays incorrect and misleading messages when this happens, leading the customer and quicken front line tech support on wild goose chases.
Suggested Fix:
- it's irresponsible for quicken to ask customers to disable security products to open their desktop banking software.
- Therefore, somebody at quicken should be regularly inspecting public malware/virus block lists relied on by security products for any IP/domains associated with quicken infrastructure. Any developer with junior level scripting knowledge could automate this process in a short timeframe, by pulling down all known block lists on a regular basis and cross-referencing with a list of quicken infrastructure assets.
- When quicken appears in these block list, quicken admins should respond immediately to get themselves removed.
- Somebody should also evaluate the cause of quicken being included in these block lists. Are they delivering adware/trackers/malware from the same ip/hostnames as their software platform? They should separate the activity from servers that people are trying to block (adware/tracking) from activity people aren't trying to block (login forms/banking data)
In the meantime:
When I get a chance, I'll try to create a white-list of domains/ips that can be loaded into pi-hole/firewall products to allow quicken to work, without disabling the security product. I'll post what works for me as a follow-up here.