I don’t think dansup was in the wrong here. Yes, it’s a security issue I suppose, but the problem lies within the underlying protocol. Any server you interact with can ignore any privacy markers you add to posts, you’re just not supposed to do that.
Whether this is a 0day depends on what you expect out of the Fediverse. If you treat it like a medium where every user or server has the potential to be hostile, like you probably should, this is a mere validation logic bug. If you treat it like the social media many of its servers are trying to be, it’s a gross violation of your basic privacy expectations.
AwesomeLowlander@sh.itjust.works 1 week ago
It’s not even a vulnerability, it’s how AP works by design, is the issue at hand here. Mastodon decided they wanted to implement something not supported by AP, and everybody else had to take the heat for not ‘doing it right’.
Microw@lemm.ee 1 week ago
That is still not the point the commenter and the original blog author were making.
What we can take away from this episode is that Pixelfed implemented the fix in a way that suggests they would not handle a 0 day exploit with a “reql” vulnerability well. And having followed dansup’s projects for a while that doesnt surprise me, because he clearly prefers to work “chaoticly” than in a structured, regulated way.
The “taking the heat” is something completely seprrate and boils down to stupid people on the internet needing to be angry at someone.
AwesomeLowlander@sh.itjust.works 1 week ago
I’m not sure you can make that conclusion. This isn’t a real vulnerability, and this isn’t a surprise to anybody who knows how the AP protocol works. Dansup didn’t reveal anything that was previously unknown, the blog author just has an axe to grind. It’s unfair to assume that an actual 0 day vulnerability would have been treated the same way.
brrt@sh.itjust.works 1 week ago
I’m genuinely curious what you would call this and what distinguishes it from a vulnerability.
Leaving aside responsibility, the system could have been set up in a way that wouldn’t have exposed user data but wasn’t. This is now fixed and user data isn’t exposed via this method any longer. What is the right word for what it was at the moment this flaw was discovered?
PhilipTheBucket@ponder.cat 1 week ago
Correct. And as I tangentially mentioned, even if you do think this needs to be kept secret, then the blog author would still be wrong, because this blog post is doing is doing way more “harm” by publicizing the issue than any amount of commit notes ever could.
But yes, trying to keep this secret like a 0-day is completely the backwards model for how to handle it.
brrt@sh.itjust.works 1 week ago
I’d argue that it is still a vulnerability in this scenario. But point taken, it’s always important to find the root cause and not just put blame on the person who stumbled into the trap.