log☇︎
121600+ entries in 0.072s
asciilifeform: mircea_popescu: this is one of those items that really wants the rsa fpga
asciilifeform: but what'll that do if browser dun check the sig
asciilifeform: gonna luvv the multi-second pageloads
mircea_popescu: i guess ima actually do just that.
mircea_popescu: i suppose on contemplation the http://btcbase.org/log/2018-01-25#1776155 would be to fucking sign javascript and you know "hey, we've had v for a while, get with the program. why are you running unsigned nonsense". ☝︎
mircea_popescu: asciilifeform slavegirl tasted, says my sperm count's fine (and delicious). so NYAH!
a111: Logged on 2016-08-01 20:03 phf: mircea_popescu: a lot of xss detection "solutions" rely on grepping for known bad input, like "script" or whatever. and there are ways to sidestep that, like '<scr' + 'ipt>' or a='ipt>';'<scr'+a. in this case whoever is fucking with detection by using this truly wtf feature i've never heard of, <meta charset="a">b</meta> that apparently parses b according to charset a rules
asciilifeform: re specs, whole thread ( e.g. http://btcbase.org/log/2016-08-01#1512423 ) re pgpkey worth a reread. ☝︎
asciilifeform: mircea_popescu: lo, aaaah, but where will you get a microshit bugcount. the stars in the sky themselves not sufficient to count !11!
asciilifeform: and the 'bad spec' thing is part of multilayered shit sandwich, the general principle is that complexicrud accretes; the overflows, etc. follow naturally ( with helping hand from kochs, dreppers, et al as necessary )
mircea_popescu: hey, i was looking for a pretext to get a test, so bbs.
asciilifeform: the philosophical puzzler of 'what is a vuln' probably cannot be answered from strictly 1side pov. consider the ultimate degenerate case, microshit, who produces more vulns every day than mircea_popescu spermatozoids , but not 1 of them dings it in any substantial way ( and many in fact are a profit )
mircea_popescu: this is EXACTLY how it goes, and perhaps why there has not yet existed such a thing as a fully implemented specification or a fully specified implementation in empire lands.
mircea_popescu: imo a fabulous textbook example of how the imperial vulnerability cycle goes. 1. make a bad spec, a la SMGL ; 2. implement some portions of it only, because http://btcbase.org/log/2018-01-25#1776189 ; 3. discover the bad spec is vulnerable, issue "best practices" for people to "santize". obviously this will not be made by 1 if 2 wasn't, so... 4) implement slightly more of the spec, throw security in disarray. ☝︎
mircea_popescu: (because they didn't parse svg tags prior, not because "it doesn't work", he could have made it to work with plain script, so it's a separate issue, but quite germane)
asciilifeform: the xss thing ? aha
mircea_popescu: there's a pile of browser captures linked in there yest.
mircea_popescu: note the epic lulz of how the "vulnerability" doesn't even work until you gert to ff version 30.
asciilifeform: the interesting thing re js, is that entirely ~aside~ from traditional cmachine bugolade, it gets compiled c-cstyle nowadays, in popular graphical wwwbrowsers, ( how else to churn 50MB of google crapola ) and so e.g. rowhammerism works in it.
mircea_popescu: i guess so, at that.
asciilifeform: well, ~wants~ to 'make new hypertext', really it's a sad emulation. but considerable improvement over nothingatall
mircea_popescu: asciilifeform half of one, yes. needs the pingback to be full.
mircea_popescu: this triad : links, pingbacks, selection reference make up a whole NEW hypertext. just as far from the old as that was from text.
asciilifeform: it's a poor man's tednelsonlink
mircea_popescu: i honestly believe it's as big as the concept of link.
asciilifeform: i use the feature also.
mircea_popescu: without the ability to link INSIDE my output $value would decrease sensibly. not a little. a lot.
asciilifeform: it isn't , as it happens, particularly difficult to neuter js in pasteolade. but that's separate , imho, matter.
mircea_popescu: but the "you enabled js, you're dead" position is untenable -- i use js for the selection thing. and i fucking need it
mircea_popescu: as i said, sent me meditating on nature of things
asciilifeform: that's the idea.
mircea_popescu: if i'm responsible for the above why am i not responsible for sending emmylark nude on a harley to luser's house to tear out intel ME out of his chip ?
asciilifeform: the fundamental q is whether there is a diff b/w 'enabled js' and 'enabled opensesamism'
asciilifeform: but conceivably one day there will be an idjit browser that gives obama root on yer box when it sees string 'open sesame'. and what, errybody gotta know in advance to escape 'open sesame', lol ? ☟︎☟︎
mircea_popescu: well which the fuck is it, and don't tell me "why mp! perl=bash=php=crap", it's not the point.
asciilifeform: let's picture the general case. the pgpkey xss thing did not 'fire' against phuctor viewers, because quoted. but did against wotpaste reader ( with 0 practical effect , but for the principle of the thing )
a111: Logged on 2018-01-16 17:08 mircea_popescu: (also, let it be pointed out for the benefit of the future noob : the use of xargs with shit from curl is dancing with the wolves. finest way to lose a box.)
a111: Logged on 2017-11-06 19:27 deedbot: http://trilema.com/2017/how-the-beastforumcom-private-messaging-function-became-a-paid-user-only-item/ << Trilema - How the beastforum.com private messaging function became a paid-user-only item
mircea_popescu: consider the celebrated lulz of (most recently) http://btcbase.org/log/2017-11-06#1733263 : none of those curls are sanitized. yet http://btcbase.org/log/2018-01-16#1771208 right ? ☝︎☝︎
mircea_popescu: is this right ?
asciilifeform: whether this matters -- is separate q
asciilifeform: the other way to think of it, is that for so long as you have a box that eats rubbish from randos, you have a mechanism for folx to host shitware to use against firefox-besotted js victims etc
asciilifeform: mircea_popescu: do you recall the case of http://btcbase.org/log/2016-08-01#1512390 ? ☝︎
mircea_popescu: obviously quoted link's right ; other than the attacks croming from nsa ("enemy" aka idiot with vested interest in idiocy), they ALL come from leaky abstractions. both points above qualify.
mircea_popescu: asciilifeform there's two fundamental items i can readily identify, maybe more. 1. i actually did plop an echo $_GET in there. is this just bad coding ? is it a legitimate assumption ? 2. he has a point, as long as it's on trilema.com, a script has powers OUTSIDE of its implicit scope, "steal cookies" whatever. is this ~actually~ bad systems design ?
a111: Logged on 2015-08-13 19:00 phf: mats: well, i actually meant the opposite. classes of attacks can be eliminated by not using c. i think that majority of the attacks come from leaky abstractions. there's no <string> in c, but there's a null terminated memory region. there's no <sql> in perl, but there's a character array with sql text in it. one of the solutions is to plug abstraction holes on a level of the language, in such a way that you can't not use improved abstractions
mircea_popescu: and in other news, http://www.gutenberg.org/files/3178/3178-h/3178-h.htm << pretty decent yarn, mark twain's forgotten novel. ☟︎
mircea_popescu: in fairness, kid's got me meditating about the nature of things ever since last night. see, the trouble is : in his syustem, he has actually found a vulnerability, as a factual matter. in my system this is entirely meaningless. why the difference ? ☟︎
trinque appreciates the deedbot fuzzing. pretty damned sure all my inputs are quoted though.
lobbes: Most of the 'dynamic' bits of the www are php+sqlite3. lobbesbot is limnoria (fork of supybot, a common python bot api), also atop sqlite3
a111: Logged on 2018-01-26 07:09 douchebag: Are there any sites any of you guys would like me to check out? I'm a bit bored right now and I am always up for a challenge :-)
lobbes: http://btcbase.org/log/2018-01-26#1776736 << you really should do the homework trinque pointed you to, but if you are done with that and bored again, plox to look at logs.minigame.bz, lobbesblog.com and lobbesbot? I'm a meganoob so you may find something. I've no shame, so disclose whatever you can find here. I'll toss a handful of satoshis your way if you do (and a wot rating) ☝︎
mircea_popescu: hey, he did find a trilema vulnerability...
a111: Logged on 2016-05-01 14:53 mircea_popescu: asciilifeform> mod6: the baked-in presumption of webtardism is almost insulting << it is insulting, not to us though. think about it : the crab has pincers because in its environment THAT WORKS ; and so does "GET /blog/blog-config.php~".
a111: Logged on 2018-01-26 08:59 douchebag: Well, since RSS is in XML format I was testing a popular vulnerability that occurs in XML parsers which uses external entities, allowing an attacker to exfiltrate data
asciilifeform must admit that the http://btcbase.org/log/2018-01-26#1776811 thread reminds him of http://btcbase.org/log/2016-05-01#1460013 ☝︎☝︎
mircea_popescu: in her case, that's the up side.
mircea_popescu: but i thought they already had a perfect medium of exchange called the unified standard dosidoe!
asciilifeform: meanwhile, in heathendom, https://archive.is/rTmuG >> 'The first freight deal settled in Bitcoin was executed last month on a vessel carrying wheat from top shipper Russia to Turkey, according to Prime Shipping Foundation, the venture behind the transaction. ... The vessel used in Prime Shipping’s transaction carried 3,000 metric tons of wheat from Rostov-on-Don to Samsun. '
shinohai: Morning tmsr
mircea_popescu: i rated you, so now the bot will allow you to voice yourself. say /query deedbot and then !!up ; it will give you a thing to decrypt, give the result back to it as !!v <string>
emmylark: Wait are you serious? I did that for you sir.
emmylark: I'm talking to you through the Freenode server in my IRC client. It made me register a name and email.
mircea_popescu: say /msg nickserv register your_password your_email_address ; use a good password and an email you actually can read, they'll send you a verification thing. this way someone else can't steal your name.
deedbot: Provide a paste URL to the ascii-armored GPG public key or the full 40 character key fingerprint without spaces or dashes.
mircea_popescu: emmylark it's very nice to get to choose ; i choose to keep the second for my private collection of smutty selfies.
emmylark: How did I do sir? Was it acceptable? I sent a second one just in case the first wasnt enough. I thought it might be nice to get to choose
mircea_popescu: tell me... how does it feel... to be all nude... like a hm... like a rolling stone.
mircea_popescu: emmylark so write 4b57ff75 on your tits ; and get your slit in the shot as well.
mircea_popescu: say hello to the group, slut.
douchebag: It's the simple things like that which can do that most damage
douchebag: I could grab the AWS Instances API keys lol
douchebag: IF I were able to find a bot that essentially returned the content of that URL and it was hosted on Amazon AWS
mircea_popescu: you think ?
mircea_popescu: douchebag it has to be signed
douchebag: Well, since RSS is in XML format I was testing a popular vulnerability that occurs in XML parsers which uses external entities, allowing an attacker to exfiltrate data ☟︎
deedbot: douchebag subscription to http://c6jqm84m3hami0jwzts22crxmosgg5.burpcollaborator.net failed
deedbot: douchebag subscription to https://my.mixtape.moe/spofpo.xml failed
deedbot: douchebag subscription to https://my.mixtape.moe/kcoilr.xml failed
douchebag: What are the commands that have that sort of functionality?
mircea_popescu: go ahead and try it
douchebag: If it's returning page responses in any way, it could be used to access internal network addresses
douchebag: That actually can hold quite the potential of a vulnerability
douchebag: mircea_popescu: So the bots in this channel for instance the one that will add your GPG key from a url you provide
douchebag: I wonder if any of the logs will pop an alert
mircea_popescu: but this browsershots set is a comedy goldmine! apparently a good third of the failful firefox browsers ALSO are getting an "uptades" blabla popup
douchebag: Don't feel bad, XSS is one of the most common vulnerabilities that exists on the majority of websites
mircea_popescu has ~0 experience with this, an' i guess it shows.
douchebag: It might be, I'm not sure at the moment if this was added with mp-wp or if it was uploaded to trilema.com's webhost a later date
mircea_popescu: douchebag was this actually in mp-wp ?!
douchebag: You'll see arbitrary html was added to the page
douchebag: Go there
mircea_popescu: odd, neither archive bot not this testbox firefox i have do it.
douchebag: So there is never a session stored on the site?
mircea_popescu: but you can't log into trilema.
douchebag: XSS can be used to steal cookies of logged in users which can then be used to jack their session.
douchebag: I was able to execute arbitrary Javascript on your site
mircea_popescu: does that actually do something ?
douchebag: Is it alright if I link you to a PoC of the vulnerability?
douchebag: How would you like me to disclose this?