cross-posted from: programming.dev/post/37090037
Comments
- Hacker News.
Submitted 15 hours ago by Pro@programming.dev to technology@lemmy.world
https://micahflee.com/iceblock-handled-my-vulnerability-report-in-the-worst-possible-way/
cross-posted from: programming.dev/post/37090037
Comments
- Hacker News.
Honestly, apart from the report being potentially wrong, the researcher seems pretty entitled as well. Like good intentions and all that, but he’s given him a week to fix the issue, usual practice in responsible disclosure are 90 days. We’re not talking about a company here, it’s some single random dude providing the app.
This really sounds like some personal issue written down for public drama, while making himself ridiculous for not knowing his own shit properly.
Security researchers feel entitled to use any kind of practice that does not comply with the security best practice homonculus, anyone found in default MUST remedy the situation of discontinue operations immediately, the security researcher has graced the community with his works and now that a flaw has been found it MUST be remedied and the security researcher is to be rewarded and adulated for his diligence and high moral standing !
This is an Apache server version error it takes 5 minutes to fix.
So fucking what? He is not being paid in any kind, and anything he does on that project is volunteer work. If he was not able to do anything on that project due to regular work, vacation, personal issues, or the simple fact that he didn’t want to?
If you don’t pay for a service, you don’t get to decide what people do, deal with it
This smells more like a Honeypot every day.
The best part is in the comments.
You’re right, he might have a backported patch and not be vulnerable to any of the several CVEs for this version of Apache. But also, his server might be really easy to hack. Rather than confirming that his server is secure, he blocked me when I reported the issue.
This dude seems like an A-hole and the article doesnt even mention, prior to the “update,” anything about ICEBlock’s response to his report so where does he get the nerve titling his little essay as he did?
This whole thing is written as if this guy has a personal vendetta against ICEBlock or its creator and is light on the facts while heavy on emotion.
Seems like a pretty shitty report in the first place, so that seems fair.
Feel like you can use local meshtastic networks to accomplish the same thing.
Having played with it a bit, I have very low hopes for Meshtastic.
Being UHF it’s very line of sight, and things like trees absorb the signal significantly. They like to talk about long range, but it really isn’t.
Meshtastic doesn’t really do intelligent routing, so it’s not great as a single large public net.
Meshtastic has a lot of little features like telemetry and such which are half-baked and broadcast on the Primary “channel.” Settings to send automatic or telemetry data over secondary channels is absent in the very half-baked software are of course missing.
It’s less secure than shouting in the street. Looking at the design of the thing, it looks like it’s a man-in-the-middle attack that’s had a chat app built around it.
And you’re not going to get normies to adopt it. It’s a garbagefuck user unfriendly chat app that you need to spend $50 on a little radio to even use, to talk to…nobody. I’ve seen the idea of “Let’s use it to communicate during our hike!” I can think of fewer practical ways to do that, because now you have to have the Meshtastic node and a phone with you, if one or the other battery dies you’re fucked, and it’s possible you’d be out of radio range of your partners before you’re out of shouting range. Somebody’s gonna walk out into the woods with a meshtastic node, fall into a hole and their body will never be found.
Idk with the mountainous terrain of my state its fine. It covers the entire city with all the relays we have and they are solar powered. I will say you are right about the security. Its literally only safe because no one knows about it.
Meshtastic is fine for a small network but people are using it with the intention of building a city-wide mesh network and it’s failing miserably. There would have to be big changes in Meshtastic before it’s viable in such an environment. Meshcore however seems to show promise. The only downside being the need for repeater nodes since clients don’t repeat. I’m seeing a little adoption of Meshcore locally.
Uhhhh yes and no? You can’t send anything but text over Meshtastic. You’re also dependent on other people using it. And it’s also extremely unreliable. Further you’d probably want a specific thread for notifications which not only would you have to convince people to join but it’d probably be filled with crosstalk since there are no moderation capabilities.
Plus it would be susceptible to the same ignorant/malicious reports as this app.
Looking more and more like Coqui is the better app.
rubin@lemmy.sdf.org 13 hours ago
This security researcher is just wrong. The version of apache running is likely in a ‘stable’ release where critical CVEs are fixed by back-porting patches to the same older version of software. Also, if I’m reading correctly, the vulnerability he cites is dependent on malicious behavior of apps hosted behind the vulnerable server. His would likely not meet this criteria, so the vulnerability does not affect his use case.
It is the blogger, IMO, who is participating in ‘theater’. A little knowledge is a dangerous thing.
Ulrich@feddit.org 1 hour ago
Well the interesting thing here is that you took the time to type that out while he just blocked the person trying to report a security vulnerability.
BlueBockser@programming.dev 8 hours ago
The example CVE linked in the article is plausible, though. The server was reportedly running 2.4.57 and the CVE was fixed in 2.4.60, so it’s definitely present in the software. Whether it would actually be exploitable is a different question.
Overall, I don’t get your point about stable releases and backports. Yes, security patches are backported, but that results in a new release (2.4.60 in this case) which still has to be updated to. It’s not like you can just stay on 2.4.57 and magically still have the fix, that’s just not how software versioning is done.
eager_eagle@lemmy.world 25 minutes ago
Distros don’t update software versions when backporting some things, meaning they add a suffix they control to the version e.g. 2.4.57-ubuntu1.2 whatever, but the version reported by the software itself might still be 2.4.57.