Comment on The fediverse has a bullying problem
brrt@sh.itjust.works 1 month ago
It sounds like she’s very upset that Dansup made it explicit that he was fixing this issue, thinking that even exposing it in commit comments (which as we know get way more readership than blog posts) would mean people knew about it, and the less people that knew about it, the safer her partner’s information would be since she is continuing to do this apparently. You will not be surprised to discover that I think that type of thinking is also a mistake.
I agreed with you at first because from your description it sounded like she was saying security through obscurity was a good thing. But that’s not the case.
What she’s saying in the blog post is that this a 0-day and should be handled according to the best practices for 0-day disclosure.
You have to decide if you want to
- publish the findings before the fix -> more people will know and exploit the vulnerability but users might be aware and may or may not be able to mitigate sharing even more
- publish the findings after the fix -> the opposite
I don’t pretend to know enough to judge which option is the best. But I can’t fault the blog author for pointing out that Dansup didn’t follow best practices.
skullgiver@popplesburger.hilciferous.nl 1 month ago
[deleted]ThorrJo@lemmy.sdf.org 1 month ago
the problem lies within the underlying protocol.
The problem lies with Gargron doing what Gargron does, implementing whatever the f he wants for “the Mastodon network” and not giving a crap how it affects the health of the overall fediverse.
Hell, this isn’t even the first time there’s been drama over Mastodon’s advisory post scopes, not by a long shot. I kinda wish I’d saved receipts from the last couple times, some highly experienced devs have chimed in in the past.
AwesomeLowlander@sh.itjust.works 1 month ago
It’s not even a vulnerability, it’s how AP works by design, is the issue at hand here. Mastodon decided they wanted to implement something not supported by AP, and everybody else had to take the heat for not ‘doing it right’.
Microw@lemm.ee 1 month ago
That is still not the point the commenter and the original blog author were making.
What we can take away from this episode is that Pixelfed implemented the fix in a way that suggests they would not handle a 0 day exploit with a “reql” vulnerability well. And having followed dansup’s projects for a while that doesnt surprise me, because he clearly prefers to work “chaoticly” than in a structured, regulated way.
The “taking the heat” is something completely seprrate and boils down to stupid people on the internet needing to be angry at someone.
AwesomeLowlander@sh.itjust.works 1 month ago
I’m not sure you can make that conclusion. This isn’t a real vulnerability, and this isn’t a surprise to anybody who knows how the AP protocol works. Dansup didn’t reveal anything that was previously unknown, the blog author just has an axe to grind. It’s unfair to assume that an actual 0 day vulnerability would have been treated the same way.
brrt@sh.itjust.works 1 month ago
I’m genuinely curious what you would call this and what distinguishes it from a vulnerability.
Leaving aside responsibility, the system could have been set up in a way that wouldn’t have exposed user data but wasn’t. This is now fixed and user data isn’t exposed via this method any longer. What is the right word for what it was at the moment this flaw was discovered?
PhilipTheBucket@ponder.cat 1 month ago
Correct. And as I tangentially mentioned, even if you do think this needs to be kept secret, then the blog author would still be wrong, because this blog post is doing is doing way more “harm” by publicizing the issue than any amount of commit notes ever could.
But yes, trying to keep this secret like a 0-day is completely the backwards model for how to handle it.
brrt@sh.itjust.works 1 month ago
I’d argue that it is still a vulnerability in this scenario. But point taken, it’s always important to find the root cause and not just put blame on the person who stumbled into the trap.