Hacker Poesy
  • FAQ
  • Login
  • Public

    • Public
    • Groups
    • Recent tags
    • Popular
    • Directory

Conversation:

Notices

  1. MMN-o ✅⃠ (mmn)'s status on Friday, 16-Sep-2016 02:39:12 EDT MMN-o ✅⃠ MMN-o ✅⃠
    Remote profile options...
    • zoowar
    It's more about being aware that things change. And combined with, say, comparing version numbers (jquery version x.y.z shouldn't change hash, and x.y.z++ would be trusted on first use).
    Friday, 16-Sep-2016 02:39:12 EDT from social.umeahackerspace.se permalink
    • MMN-o ✅⃠ (mmn)'s status on Friday, 16-Sep-2016 02:41:17 EDT MMN-o ✅⃠ MMN-o ✅⃠
      Remote profile options...
      That means googleapis.com or whatever can't silently deliver me different files if they get hacked or MITM'ed (and I assume I trust the URLs linked on the site I visit via NoScript interaction).
      Friday, 16-Sep-2016 02:41:17 EDT permalink
    • MMN-o ✅⃠ (mmn)'s status on Friday, 16-Sep-2016 02:49:57 EDT MMN-o ✅⃠ MMN-o ✅⃠
      Remote profile options...
      • zoowar
      In this case I'm not the one applying updates. All the CDN based script embeddings are made with version numbers in the URL. The attack vector is an evil server thah will serve different files depending on refererer/client/randomness".
      Friday, 16-Sep-2016 02:49:57 EDT permalink
    • MMN-o ✅⃠ (mmn)'s status on Friday, 16-Sep-2016 04:01:43 EDT MMN-o ✅⃠ MMN-o ✅⃠
      Remote profile options...
      • zoowar
      @zoowar Idea is: 1. I visit random .se website that doesn't think they need a CDN. They embed a third party link to http://status.hackerposse.com/url/11954 for jquery-v1.3.37.js 2. http://status.hackerposse.com/url/11954 is backdoored by whateveragency or malicious third party hacker that manipulated their way to a Verisign *.com certificate and can MITM me at the Tor …
      Friday, 16-Sep-2016 04:01:43 EDT permalink

      Attachments

      1. mmn-20160916-ostatus-qcjq.html
    • MMN-o ✅⃠ (mmn)'s status on Friday, 16-Sep-2016 04:04:40 EDT MMN-o ✅⃠ MMN-o ✅⃠
      Remote profile options...
      @zooowar That is, most sites I visit which incorporate third party .js links will likely not be targeted by malicious hackers - but instead they can target the googleapis.com domain etc. and deliver a payload through there.
      Friday, 16-Sep-2016 04:04:40 EDT permalink
    • MMN-o ✅⃠ (mmn)'s status on Friday, 16-Sep-2016 04:04:53 EDT MMN-o ✅⃠ MMN-o ✅⃠
      Remote profile options...
      • zoowar
      @zoowar That is, most sites I visit which incorporate third party .js links will likely not be targeted by malicious hackers - but instead they can target the googleapis.com domain etc. and deliver a payload through there.
      Friday, 16-Sep-2016 04:04:53 EDT permalink
    • MMN-o ✅⃠ (mmn)'s status on Friday, 16-Sep-2016 04:51:56 EDT MMN-o ✅⃠ MMN-o ✅⃠
      Remote profile options...
      • zoowar
      @zoowar It'd be fun to implement something that, with a plugin that tracks content hash sums, can interpret and prioritise hashsrc="sha256:1234...cdef"
      Friday, 16-Sep-2016 04:51:56 EDT permalink
    • MMN-o ✅⃠ (mmn)'s status on Friday, 16-Sep-2016 05:21:19 EDT MMN-o ✅⃠ MMN-o ✅⃠
      Remote profile options...
      • zoowar
      @zoowar because I didn't know about it, thanks!
      Friday, 16-Sep-2016 05:21:19 EDT permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • Privacy
  • Source
  • Version
  • Contact

Hacker Poesy is a GNU social hub. It runs version 1.1.3-beta3, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Hacker Poesy content and data are available under the Creative Commons Attribution 3.0 license.

Switch to mobile site layout.