• 27 Posts
  • 525 Comments
Joined 3 years ago
cake
Cake day: August 10th, 2023

help-circle
  • What port was this sent to, and what webserver are you running (if it was sent to a webserver)?

    This reminds me of the string to strigger the really bad apache vulnerabilities that lead to being able to read from the whole filesystem (path traversal), or get a shell on your system (remote code execution). It’s likelu that bots are spray and praying attempts across the internet. As long as you’re up to date, you should be good.


  • I’ve had similar experiences with this FPS game called krunker.io

    Krunker.io is a browser based game, and it had a pretty bad cheating problem, and since it was a browser based gamr, the devs could never implement an anticheat that worked for long.

    They implemented a deputization system, where certain respected members of the community would become “krunker police”, and then you could call them from a lobby. They would then invisibly spectate, and record and ban cheaters. The system worked really well, actually. Cheaters were banned quickly, and the requirement collection of video evidence held those involved accountable.

    But krunker players had another interesting way of handling cheaters. You see, krunker has really bad netcode, bad enough that you would have to lead hitscan weapons a variable amount depending on how much ping you had. Krunker was also a movement shooter, where you could slidehop and go really, really fasy. The combination meant that you could dodge the shots of cheaters. As I got better, I just stopped calling krunker police, and started beating them. One of my fondest memories was this one lobby full of good players, and when a cheater joined we stomped them below all of us on the ranking, taunting them all the way down. At the end, they tried to sell their cheats and we all laughed. “Why would I buy these cheats? I’m better than them”. Eventually they ragequit. Good times.

    But nooooo, nowadays modern game publishers need control over every part of the game. They demand control over the servers, refusing to let anybody host their own communities. They demand absolute control over the community, but refuse to actually moderate it and handle toxicity. And now, they’re demanding control over the clients, forcing you to install rootkits on your computers so they can control those too.


  • FreeBSD, OpenBSD and NetBSD are behind Linux.

    Look, I dislike permissive licenses too, but you need a source to back this claim up.

    Right now, each BSD does something special, that Linux (distro’s) can’t trivially replace, even if the usecase is more niche. NetBSD Dev’s make efforts to get it running on many devices as they can. OpenBSD (and it’s subprojects) are highly secure, moreso than Linux. Who do you think makes our beloved OpenSSH? OpenSSH noted for having very few vulnerabilities over it’s two decade long existence, and OpenBSD itself is similar, which is insane because there are products with multiple bad vulnerabilities every year (Linux being one of them…). This is due to a highly security minded architecture - one that Linux lacks.

    FreeBSD is like Linux before systemd. I like systemd, but systemd is really trying to be kubernetes on a single node. I like systemd because I like kubernetes, but I understand why someone wouldn’t like it, and I question if “single node k8s” is the best architecture for a single server or personal desktop. The ports system results in freebsd packaging many server services that aren’t packaged on Linux. Being able to manage those through the system package manager, and the conviniences that provides, is nice.

    Different, and not popular don’t mean bad.






  • go run works by compiling the program to a temporary executable and then executing that.

    can you guarantee that runs everywhere

    It seems to depend on glibc versions, if that’s what you are asking. You can force it to be more static by using a static musl python or via other tools. Of course, a binary for Linux only runs on Linux and the same for Windows and Mac. But yeah.

    Also it should be noted that go binaries that use C library dependencies are not truly standalone, often depending on glibc in similar ways. Of course, same as pyinstaller, you can use musl to make it more static.







    1. Bluetooth probably won’t be able to give you good quality audio and mic input at the same time. It doesn’t have enough bandwidth over a single channel, last time I tried. Of course that was probably like 5 years ago and things might’ve changed, like a theoretical workaround I thought about is the headset simply having two bluetooth reveivers and connecting twice. But yeah.

    Edit: I suspect jgrffn’s comment in the thread refutes the above. I might test later.

    1. Most of the proprietary wireless 2.4 ghz usb adapters I have tried have worked fine and better than bluetooth since they can do good audio and mic at low latencies. I have used logitech and corsair but my logitechs died on me (one I bought had the left side die and the other the right side :/) and the corsair earmuffs fell apart after I made the mistake of not being perfectly dry once. So I can’t really recommend my most used headsets.


  • I won’t lie, I use curl | bash as well, but I do dislike it for two reasons:

    Firstly, it is much, much easier to compromise the website hosting than the binary itself, usually. Distributed binaries are usually signed by multiple keys from multiple servers, resulting in them being highly resistant to tampering. Reproducible builds (two users compiling a program get the same output) make it trivial to detect tampering as well.

    On the other hand, websites hosting infrastructure is generally nowhere near as secure. It’s typically one or two VPS’s, and there is no signature or verification that the content is “official”. So even if I’m not tampering with the binary, I can still tamper with the bash script to add extra goodies to it.

    On the other hand (but not really relevant to what OP is talking about), just because I trust someone to give me a binary in a mature programming language they have experience writing in, doesn’t mean I trust them to give me a script in a language known for footguns. A steam bug in their bash script once deleted a user’s home directory. There have also been issues with AUR packages, which are basically bash scripts, breaking people’s systems as well. When it comes to user/community created scripts, I mostly trust them to not be malicious, and I am more fearful of a bug or mistake screwing things up. But at the same time, I have little confidence in my ability to spot these bugs.

    Generally, I only make an exception for running bash installers if the program being installed is a “platform” that I can use to install more software. K3s (Kubernetes distro), or the Nix package manager are examples. If I can install something via Nix or Docker then it’s going to be installed via there and not installed via curl | bash. Not every developer under the sun should be given the privilege of running a bash script on my system.

    As a sidenote, docker doesn’t recommend their install script anymore. All the instructions have been removed from the website, and they recommend adding their own repo’s instead. Personally, I prefer to get it from the distro’s repositories, as usually that’s the simplest and fastest way to install docker nowadays.









  • It’s easy. Mumble. Or the thing you used probably still works.

    But you see, people never actually seek a discord alternative. They want a discord alternative that includes all the features in one app that is also federated, AND end to end encrypted, and each one makes things vastly more technically challenging and resource intensive and then you want them together.

    A little secret: Matrix is much, much easier to host if you disable encryption and federation. Federation to many servers is the main performance killer, and “failed to decrypt message” will all disappear if you disable encryption.


  • If your software updates between stable releases break, the root cause is the vendor, rather than auto updating. There exist many projects that manage to auto update without causing problems. For example, Debian doesn’t even do features or bugfixes, but only updates apps with security patches for maximum compatibility.

    Crowdstrike auto updating also had issues on Linux, even before the big windows bsod incident.

    https://www.neowin.net/news/crowdstrike-broke-debian-and-rocky-linux-months-ago-but-no-one-noticed/

    It’s not the fault of the auto update process, but instead the lack of QA at crowdstrike. And it’s the responsibility of the system administrators to vet their software vendors and ensure the models in use don’t cause issues like this. Thousands of orgs were happily using Debian/Rocky/RHEL with autoupdates, because those distros have a model of minimal feature/bugfixes and only security patches, ensuring no fuss security auto updates for around a decade for each stable release that had already had it’s software extensively tested. Stories of those breaking are few and far between.

    I would rather pay attention to the success stories, than the failures. Because in a world without automatic security updates, millions of lazy organizations would be running vulnerable software unknowingly. This already happens, because not all software auto updates. But some is better than none and for all software to be vulnerable by default until a human manually touches it to update it is simply a nightmare to me.