<?xml version="1.0" encoding="UTF-8"?>



<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <atom:link href="http://stanleylieber.com:80/new/index.rss" rel="self" type="application/rss+xml" />
        <title><![CDATA[I'm not really Stanley Lieber.]]></title>
        <link>http://stanleylieber.com:80/new/index.rss</link>
        <description><![CDATA[I'm not really Stanley Lieber.]]></description>
        <language>en-us</language>
        <generator><![CDATA[Tom Duff's rc, and Kris Maglione's clever hackery]]></generator>
<lastBuildDate>Sun, 03 Jul 2022 17:33:19 -0400</lastBuildDate>

        <item>
            <title><![CDATA[stolen valor]]></title>
            <author><![CDATA[sl@noreply.cat-v.org (sl)]]></author>
            <link>http://stanleylieber.com:80/new/2022/07/03/0/</link>
            <guid isPermaLink="true">http://stanleylieber.com:80/new/2022/07/03/0/</guid>
            <pubDate>Sun, 03 Jul 2022 17:10:06 -0400</pubDate>
            <description> &lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23306/img/small.1656881630.png" alt="star wars wallet, 1983" /&gt;&lt;/p&gt;

&lt;p&gt;I started kindergarten in the fall of 1983. For my birthday that year I received this Star Wars wallet. I carried it everywhere.&lt;/p&gt;

&lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23307/img/small.1656881648.png" alt="oberto beef jerky" /&gt;&lt;/p&gt;

&lt;p&gt;I stuffed a bunch of clippings inside, filling out my legend with various bits of pocket lint. I don&amp;rsquo;t remember ever actually eating beef jerky while I was growing up, but according to my cover story I loved it.&lt;/p&gt;

&lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23308/img/small.1656881666.png" alt="cpr for citizens, narrated by orson welles" /&gt;&lt;/p&gt;

&lt;p&gt;The character I was portraying was also a big fan of Orson Welles.&lt;/p&gt;

&lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23309/img/small.1656881685.png" alt="military markings" /&gt;&lt;/p&gt;

&lt;p&gt;And, I insisted, a veteran (more on that in a minute).&lt;/p&gt;

&lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23310/img/small.1656881703.png" alt="i am" /&gt;&lt;/p&gt;

&lt;p&gt;&amp;ldquo;I am that I am.&amp;rdquo;&lt;/p&gt;

&lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23311/img/small.1656881722.png" alt="tattoo (removed)" /&gt;&lt;/p&gt;

&lt;p&gt;This is the tattoo I got during my tour in Vietnam. I had it removed before I came home, and I carried it around to remind me of everything I&amp;rsquo;d been through. I may or may not have left a young family behind there, whom by this time, I would guess, are all grown up (just like me).&lt;/p&gt;

&lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23313/img/small.1656881764.png" alt="back of wallet" /&gt;&lt;/p&gt;
 </description>
        </item>

        <item>
            <title><![CDATA[complexity vs idiots]]></title>
            <author><![CDATA[sl@noreply.cat-v.org (sl)]]></author>
            <link>http://stanleylieber.com:80/new/2022/04/03/0/</link>
            <guid isPermaLink="true">http://stanleylieber.com:80/new/2022/04/03/0/</guid>
            <pubDate>Fri, 29 Apr 2022 08:34:42 -0400</pubDate>
            <description> &lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23180/img/small.1648913845.png" alt="KEK, KEK, KEK!" /&gt;&lt;/p&gt;

&lt;p&gt;Around 1997 I used search engines to find poorly configured &lt;a href="https://en.wikipedia.org/wiki/IRIX"&gt;IRIX&lt;/a&gt; servers with &lt;em&gt;/etc/passwd&lt;/em&gt; exposed to the Internet via classic &lt;a href="https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/05-Authorization_Testing/01-Testing_Directory_Traversal_File_Include"&gt;directory traversal&lt;/a&gt;.  IRIX helpfully provided several accounts with &lt;a href="https://www.passwordsdatabase.com/vendor/sgi"&gt;factory default passwords&lt;/a&gt;, so these usernames were easy to search for, which was in turn an easy way to identify IRIX hosts.  Unpatched &lt;a href="https://insecure.org/sploits_irix.html"&gt;local root vulnerabilities&lt;/a&gt; ensured that &lt;a href="http://img.stanleylieber.com/src/23185/img/1649040788.jpg"&gt;&amp;ldquo;Game over, man.&amp;rdquo;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;9front includes a web server written in &lt;a href="http://rc.cat-v.org"&gt;rc&lt;/a&gt;, called &lt;a href="http://man.9front.org/8/rc-httpd"&gt;rc-httpd&lt;/a&gt;. It was written to run on a Mac, but early on I transplanted it into &lt;a href="https://en.wikipedia.org/wiki/Plan_9_from_Bell_Labs"&gt;Plan 9&lt;/a&gt; in order to serve &lt;a href="http://9front.org"&gt;9front.org&lt;/a&gt;, &lt;a href="http://cat-v.org"&gt;cat-v.org&lt;/a&gt;, and other sites.  We&amp;rsquo;ve made some refinements over the years, but it remains very simple.  Most importantly, it works well for static or CGI pages, the latter of which is needed by &lt;a href="http://werc.cat-v.org"&gt;werc&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Plan 9 makes erecting trivial sandboxes easy, but robust ones remain elusive if the quirky restrictions embodied in the special user &lt;a href="http://fqa.9front.org/fqa7.html#7.3.3.1.1"&gt;none&lt;/a&gt; are for some reason undesirable.  For close to ten years I&amp;rsquo;ve run all our sites on &lt;em&gt;rc-httpd&lt;/em&gt; with no sandboxing at all.  Since public websites and public mailing lists are all that have ever been stored on the machine, I&amp;rsquo;ve never mustered the gumption to try and harden the environment further.&lt;/p&gt;

&lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23178/img/small.1648869982.png" alt="Tangle of fibers terminating in a Juniper MX960." /&gt;&lt;/p&gt;

&lt;p&gt;Late last month, &lt;a href="https://4chan.org"&gt;4chan&amp;rsquo;s&lt;/a&gt; &lt;a href="https://boards.4channel.org/g/"&gt;/g/&lt;/a&gt; discovered a &lt;a href="http://9front.org/press/4chan.org/g/2022.03.31.plan-99front-is-super-secure.html"&gt;directory traversal bug in &lt;em&gt;rc-httpd&lt;/em&gt;.&lt;/a&gt;  It &lt;strong&gt;shouldn&amp;rsquo;t&lt;/strong&gt; have been much of a problem because the web files &lt;strong&gt;should&lt;/strong&gt; have been sandboxed from the rest of the file system.  It &lt;strong&gt;wasn&amp;rsquo;t&lt;/strong&gt; much of a problem because not much else was accessible via the file system.  Still, it&amp;rsquo;s true this class of bug in a web server program has been very well known dating back to the dawn of the World Wide Web, and it&amp;rsquo;s pretty silly that it was present in &lt;em&gt;rc-httpd&lt;/em&gt;.  The 4chan thread was full of witty comments about the rookie mistakes in our homemade software.  The solution of course is to run software too complex to be understood by humans, whose development is sponsored by, and for all practical purposes controlled by hostile corporations.&lt;/p&gt;

&lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23174/img/small.1648695221.png" alt="Corporate sponsored ABCs." /&gt;&lt;/p&gt;

&lt;p&gt;Based on my &lt;a href="http://9front.org/press/4chan.org/g/2022.03.31.plan-99front-is-super-secure.sys-log-www.txt"&gt;logs&lt;/a&gt; it is clear that two major leaks occurred as a result of this attack:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The subscriber lists of all the public mailing lists hosted on the machine.  (Less than critical because already more-or-less public information.)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The passwords of all the users of the various &lt;em&gt;werc&lt;/em&gt; websites hosted on the machine.  (Less than critical because there have not been any users authenticating to any of these websites for several years.)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;No other private information was exfiltrated.  No data on the server was modified.  There was, however, considerable excitement surrounding the &amp;ldquo;discovery&amp;rdquo; of files on the server that were either part of the 9front distribution or otherwise linked from the websites served by the machine.  In other words, data that was already publicly available even without unintended directory traversal.&lt;/p&gt;

&lt;p&gt;Because &lt;em&gt;rc-httpd&amp;rsquo;s&lt;/em&gt; &lt;a href="http://git.9front.org/plan9front/plan9front/90a08cf1fda8eaf4afe98f74a7572fb36b7ef369/sys/lib/dist/rc/bin/rc-httpd/select-handler/f.html"&gt;configuration file&lt;/a&gt; is also executable &lt;em&gt;rc&lt;/em&gt;, I was able to close the hole on my server in a handful of minutes by manually rejecting requests containing the improper string.  Because the code was simple &lt;strong&gt;in general,&lt;/strong&gt; the program was &lt;a href="http://git.9front.org/plan9front/plan9front/241667b933ff5bacb9a3974f6877fb8aad78bed3/commit.html"&gt;patched&lt;/a&gt; fairly quickly.  Because I have been mostly absent from 9front development since the importation of &lt;a href="http://shithub.us/ori/git9/HEAD/info.html"&gt;git9&lt;/a&gt;, I flubbed the initial commit, and later accidentally reverted the fix on my own server for several hours.&lt;/p&gt;

&lt;p&gt;Because I&amp;rsquo;m an idiot, all of this happened in the first place.&lt;/p&gt;

&lt;p&gt;Computers are unsafe at any speed.&lt;/p&gt;

&lt;p&gt;&lt;img src="http://img.stanleylieber.com/src/23176/img/small.1648822994.png" alt="Virtual Reality user panhandles for food." /&gt;&lt;/p&gt;
 </description>
        </item>
    </channel>
</rss>

