Skip to content
  • Categories
  • Recent
  • Tags
  • All Topics
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Caint logo. It's just text.
  1. Home
  2. Uncategorized
  3. I told Joshua Aaron, developer of ICEBlock, that he was running a vulnerable version of Apache on his server.
Welcome to Caint!

Issues? Post in Comments & Feedback
You can now view, reply, and favourite posts from the Fediverse. You can click here or click on the on the navigation bar on the left.

I told Joshua Aaron, developer of ICEBlock, that he was running a vulnerable version of Apache on his server.

Scheduled Pinned Locked Moved Uncategorized
18 Posts 5 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • CassandrichD Cassandrich

    @micahflee @khm I didn't see any legitimately critical CVEs there.

    khmK This user is from outside of this forum
    khmK This user is from outside of this forum
    khm
    wrote last edited by
    #7
    not to mention the fact, as mentioned, it's not possible to ascertain which CVEs apply based on an arbitrary version string or nmap fingerprint. now this jerk is victim-blaming the person who was bullied into reinstalling software because some clout-chasing beancounter needed something to tiktok into a camera about.

    like of course this dude had to do something, he had some twerp with a basement full of followers shit-talking him with zero evidence and then shit-talking him again for correctly blocking an ignorant gadfly.

    this whole thing is an embarassment and it's the worst kind of pedantic bullshit "cybersecurity" that helps nobody but a self-aggrandizing parasite.

    CC: @micahflee@infosec.exchange
    1 Reply Last reply
    0
    • ChrisJ This user is from outside of this forum
      ChrisJ This user is from outside of this forum
      Chris
      wrote last edited by
      #8

      @khm @dalias @micahflee

      Just to be clear:

      1) You think he should've conducted an unauthorized pen test against the server to confirm the vulnerability?

      2) You think "You seem to be running Apache httpd 2.4.57 [...] this version of Apache has multiple critical CVEs which could take over your server" is "bullying"?

      3) You think an enterprise would be better off not using a tool like Nessus to alert on potential vulnerabilities that should be reviewed?

      lol. "supercomputing engineer" lmao

      khmK 1 Reply Last reply
      0
      • ChrisJ Chris

        @khm @dalias @micahflee

        Just to be clear:

        1) You think he should've conducted an unauthorized pen test against the server to confirm the vulnerability?

        2) You think "You seem to be running Apache httpd 2.4.57 [...] this version of Apache has multiple critical CVEs which could take over your server" is "bullying"?

        3) You think an enterprise would be better off not using a tool like Nessus to alert on potential vulnerabilities that should be reviewed?

        lol. "supercomputing engineer" lmao

        khmK This user is from outside of this forum
        khmK This user is from outside of this forum
        khm
        wrote last edited by
        #9
        1. Nobody said that. My assertion is this dipshit didn't have sufficient evidence for anything more than an email worrying about the Apache version. Once. Not a series of histrionic blog posts about it.

        2. Nobody said that. It was the rest of the behavior that constituted bullying. You're going to have to come up with a better approach than "inaccurately summarizing my arguments" to get anywhere here.

        3. Yes, I do, because Nessus as deployed at many agencies is a box-checking exercise used in place of proper security engineering. I can provide dozens of real-world examples of poorly-configured Nessus scans doing more harm than good, but I don't think you're making a good-faith argument here, so it's probably not worth my time.

        lol. "easily verifiable claims" lmao

        CC: @dalias@hachyderm.io @micahflee@infosec.exchange
        1 Reply Last reply
        0
        • khmK This user is from outside of this forum
          khmK This user is from outside of this forum
          khm
          wrote last edited by
          #10
          just for shits and giggles, I'll give a sterling example regarding this kind of bullshit being problematic in an actual working environment.

          normally, when one purchases a RHEL license, you purchase a license for the major version. You're expected to roll along from e.g. 9.2 -> 9.3 etc. However, for precisely-engineered things like supercomputers, this is not a good idea, because it subjects you to performance regressions that aren't tested for in the mainline distro. Red Hat's solution to this is to offer "EUS" licenses -- extended update support. This means you can stick on e.g. 9.2 far longer than the normal contract, because Red Hat does the work backporting security patches. What doesn't change is the upstream version numbers tagged on the packages.

          For an inexcusably long time, Nessus didn't support this unless you had a full-time person on the backend identifying the package versions (including release and/or build versions), which almost nobody does.

          The result? You follow all the STIGs, you've got vendor security support, your node bringup health-check runs POC code to confirm known vulns are covered, and you still get angry emails with six hundred false positives from whatever peabrain is lazily running the Nessus scan. Now, instead of doing actual administration, you have to write memos, rehashing the arguments you made last time, because the kind of "security engineer" who hits the panic button behind some bullshit lasts about six months on the job, but the badly-configured Nessus deployment outlives them to be run by the next box-checker to warm that seat.

          This is exactly the same scenario. Some low-information box-checker gets angry because nobody listens to their baseless whining. The only difference is it's happening on some asshole's blog instead of in an Outlook thread with everyone's managers CCed.

          CC: @jazzhandmedowns@mastodon.sdf.org @dalias@hachyderm.io @micahflee@infosec.exchange
          1 Reply Last reply
          0
          • ChrisJ This user is from outside of this forum
            ChrisJ This user is from outside of this forum
            Chris
            wrote last edited by
            #11

            @khm @dalias @micahflee

            You criticized Micah for having done "zero followup work to confirm any vulnerability" but by what means are you suggesting he do so?

            This isn't the agency you work for; it's some rando's app. Sure, it's POSSIBLE that his Apache had a backported patch, but it's JUST AS POSSIBLE that he doesn't know how to secure his shit.

            You're assuming it's the former because you're projecting frustrations from your JOB onto a wholly unrelated scenario—that's some sadfuck shit!

            khmK 1 Reply Last reply
            0
            • ChrisJ Chris

              @khm @dalias @micahflee

              You criticized Micah for having done "zero followup work to confirm any vulnerability" but by what means are you suggesting he do so?

              This isn't the agency you work for; it's some rando's app. Sure, it's POSSIBLE that his Apache had a backported patch, but it's JUST AS POSSIBLE that he doesn't know how to secure his shit.

              You're assuming it's the former because you're projecting frustrations from your JOB onto a wholly unrelated scenario—that's some sadfuck shit!

              khmK This user is from outside of this forum
              khmK This user is from outside of this forum
              khm
              wrote last edited by khm@hj.9fs.net
              #12
              I'm not suggesting any means by which he follow up, because it's not his fucking place to follow up. That's why I said what I said -- the shit he found warranted one friendly email and no more. The complete lack of information about the operating environment possessed by Captain Blogsalot is a Very Large Signpost that this rando is not the person to publicly pillory some other rando. That's my entire point! It doesn't even matter who is right, because there is nothing here to be right about.

              I'm assuming it's the former because I have no reason to believe it's the latter. What you're deriding as "frustrations from my JOB" is what is known in the industry as "professional experience," which is the arcane lore that you asked about and which allows me to recognize when some blogger fuck is sticking his nose where it is not helpful. I hope this context brings you peace.

              CC: @dalias@hachyderm.io @micahflee@infosec.exchange
              1 Reply Last reply
              0
              • ChrisJ This user is from outside of this forum
                ChrisJ This user is from outside of this forum
                Chris
                wrote last edited by
                #13

                @khm @dalias @micahflee

                So your initial criticism was that he "did zero followup work to confirm any vulnerability"

                but now you're saying "it's not his fucking place to follow up"?

                Which one is it?

                Given your anger management issues and winning personality, it's becoming clearer that the security engineers at your agency are using nessus scans just to bust your balls, lol

                khmK 1 Reply Last reply
                0
                • ChrisJ Chris

                  @khm @dalias @micahflee

                  So your initial criticism was that he "did zero followup work to confirm any vulnerability"

                  but now you're saying "it's not his fucking place to follow up"?

                  Which one is it?

                  Given your anger management issues and winning personality, it's becoming clearer that the security engineers at your agency are using nessus scans just to bust your balls, lol

                  khmK This user is from outside of this forum
                  khmK This user is from outside of this forum
                  khm
                  wrote last edited by
                  #14
                  My initial criticism was "zero followup work," thus rendering the blog posts baseless fearmongering, and now I'm saying it's not his place to follow up, which is consistent because the blog posts are a bad idea which should not have been posted to begin with.

                  Not sure why this is confusing for you, but given that you think you can read emotions through social media posts, I'm sure a lot of things are confusing for you

                  CC: @dalias@hachyderm.io @micahflee@infosec.exchange
                  1 Reply Last reply
                  0
                  • Li ~ Crystal SystemL This user is from outside of this forum
                    Li ~ Crystal SystemL This user is from outside of this forum
                    Li ~ Crystal System
                    wrote last edited by
                    #15

                    @khm @dalias @micahflee

                    counterpoint : don't assume malice for what can be explained by ignorance..

                    khmK 1 Reply Last reply
                    0
                    • ChrisJ This user is from outside of this forum
                      ChrisJ This user is from outside of this forum
                      Chris
                      wrote last edited by
                      #16

                      @khm @dalias @micahflee

                      Oh dear, you're unable to read emotions through social media posts?

                      And you think that's the normal experience of most people?

                      There's something you really need to know about yourself, but honestly, I shouldn't be the one to tell you.

                      khmK 1 Reply Last reply
                      0
                      • ChrisJ Chris

                        @khm @dalias @micahflee

                        Oh dear, you're unable to read emotions through social media posts?

                        And you think that's the normal experience of most people?

                        There's something you really need to know about yourself, but honestly, I shouldn't be the one to tell you.

                        khmK This user is from outside of this forum
                        khmK This user is from outside of this forum
                        khm
                        wrote last edited by
                        #17
                        I presume the deflection indicates I've got through to you and you finally understand my argmuent. Glad we got there in the end!

                        CC: @dalias@hachyderm.io @micahflee@infosec.exchange
                        1 Reply Last reply
                        0
                        • Li ~ Crystal SystemL Li ~ Crystal System

                          @khm @dalias @micahflee

                          counterpoint : don't assume malice for what can be explained by ignorance..

                          khmK This user is from outside of this forum
                          khmK This user is from outside of this forum
                          khm
                          wrote last edited by
                          #18
                          in a world with unfettered access to massive stores of knowledge, most ignorance is malicious

                          CC: @dalias@hachyderm.io @micahflee@infosec.exchange
                          1 Reply Last reply
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Don't have an account? Register

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • All Topics
                          • Popular
                          • World
                          • Users
                          • Groups