zlacker

[parent] [thread] 17 comments
1. Nick87+(OP)[view] [source] 2023-05-04 19:21:24
What about serving the challenge file from the root or a near-root of the fully qualified url? Like www.domain.com/mastodon.txt or abc.freehost.com/mastodon.txt?

Maybe I'm old but what are some popular use cases for webfinger? (I'm just learning about it now)

replies(5): >>tingle+r1 >>ownage+P1 >>arianv+x2 >>chrism+P2 >>bowmes+rf
2. tingle+r1[view] [source] 2023-05-04 19:28:51
>>Nick87+(OP)
.well-known is basically the same idea https://datatracker.ietf.org/doc/html/rfc5785
3. ownage+P1[view] [source] 2023-05-04 19:30:28
>>Nick87+(OP)
Or why not just serve it from www.domain.com/.well-known so we only have one thing to block. :p
4. arianv+x2[view] [source] 2023-05-04 19:33:09
>>Nick87+(OP)
That is basically the idea of .well-known

Webfinger is when you want to multiplex multiple identities on a single domain

E.g. https://example.com/.well-known/webfinger?resource=nick@exam...

Will serve the challenge proving your handle is @nick@example.com

5. chrism+P2[view] [source] 2023-05-04 19:34:51
>>Nick87+(OP)
The /.well-known/ path prefix is the standard name to use (https://www.rfc-editor.org/rfc/rfc8615) so that any sort of “we’ll host user content from our domain” thing can block it. (Hosting user content from the user’s domain is fine and doesn’t need this restriction.)

A few things are effectively grandfathered in due to their vintage: /favicon.ico, /sitemap.xml and /robots.txt are the three that occur to me—so if you’re running something vaguely like S3, you’ll want to make sure users can’t create files at the top level of your domain matching at least those names.

But nothing new should use anything other than /.well-known/ for domain-scoped stuff, or else you run into exactly this problem.

replies(2): >>jrockw+Uh >>cesarb+Bk
6. bowmes+rf[view] [source] 2023-05-04 20:38:18
>>Nick87+(OP)
s3 supports my-bucket.s3-us-west-2.amazonaws.com style URLs as well
replies(1): >>thayne+r81
◧◩
7. jrockw+Uh[view] [source] [discussion] 2023-05-04 20:52:07
>>chrism+P2
I learned something new today. I guess .well-known's purpose isn't well known!
replies(1): >>tialar+YE
◧◩
8. cesarb+Bk[view] [source] [discussion] 2023-05-04 21:03:49
>>chrism+P2
> A few things are effectively grandfathered in due to their vintage: /favicon.ico, /sitemap.xml and /robots.txt are the three that occur to me—so if you’re running something vaguely like S3, you’ll want to make sure users can’t create files at the top level of your domain matching at least those names.

I also recall /crossdomain.xml as an important one; allowing users to create an arbitrary file matching that name could allow certain kinds of cross-site attacks against your site.

replies(1): >>ehPRet+Lm
◧◩◪
9. ehPRet+Lm[view] [source] [discussion] 2023-05-04 21:15:59
>>cesarb+Bk
I think crossdomain.xml died with Flash but I could be wrong, does anyone know?
replies(1): >>roblab+dp
◧◩◪◨
10. roblab+dp[view] [source] [discussion] 2023-05-04 21:29:17
>>ehPRet+Lm
None of the standardized web technologies use crossdomain.xml, but I think Acrobat Reader still uses it for... stuff. And acrobat still has a browser plugin, so I guess it's still a potential vector for abuse.
replies(2): >>ehPRet+RY >>easrng+Ub1
◧◩◪
11. tialar+YE[view] [source] [discussion] 2023-05-04 23:08:41
>>jrockw+Uh
The most important people to know about this stuff are the people for whom it's effectively part of how to do their job correctly. I know what it means if there's a flashing single amber light on a railway signal in my country, but it's not important that you know, and wouldn't be important if I'm wrong, however it's very important that the train driver knows what it means.

You'd hope that people doing job X would seek at least some insight into whether there are best practices for doing X, even if it's not a regulated job where you're required by law to have proper training. Not so much unfortunately.

Example: Many years ago now, early CA/B Forum rules allowed CAs to issue certificates for DNS names under TLDs which don't exist on the Internet. So e.g. back then you could buy a cert for some.random.nonsense and that was somehow OK, and people actually paid for that. It's worthless obviously, nobody owns these names, but until it was outlawed they found customers. But, even though the list of TLDs is obviously public information, some CAs actually didn't know which ones existed. As a result some companies were able to tell a real public CA, "Oh we use .int for our internal services, so just give us a certificate for like www.corp-name.int" and that worked. The CAs somehow didn't realise .int exists, it's for International Organisations, like ISO or the UN, and so they issued these garbage certificates.

[Today the rules require that publicly trusted CAs issue only for names which do exist on the public Internet, or which if they did exist would be yours, and only after seeing suitable Proof of Control over the name(s) on the certificate.]

◧◩◪◨⬒
12. ehPRet+RY[view] [source] [discussion] 2023-05-05 02:15:11
>>roblab+dp
ah! Reader. That's a fun one. I once encountered an "Acrobat Reader-only" PDF that after filling out and selecting any applicable attachments on your filesystem you then... literally put in your credentials to the website in the PDF so that it could.. submit itself. I lost some braincells seeing that..
replies(1): >>capeco+001
◧◩◪◨⬒⬓
13. capeco+001[view] [source] [discussion] 2023-05-05 02:30:06
>>ehPRet+RY
Oh man, then you really don’t want to know about a product I once created.

Reader could have an optional Flash plugin, and better yet, you could configure the PDF interactive plugin to dynamically download the swf file to run.

I built an entire Flex based rich UI that was dynamically loaded by the 1kb PDF you’d receive in email, the Flex app retrieved and posted data via HTTP APIs.

Because reasons.

That product was live for years. I think we shut it down as recently as 2 years ago.

To be 100% clear, wasn’t my idea.

But it was my mistake to joke about the absurd possibility to build such a thing in front of some biz folks.

replies(1): >>ehPRet+Y31
◧◩◪◨⬒⬓⬔
14. ehPRet+Y31[view] [source] [discussion] 2023-05-05 03:22:34
>>capeco+001
oh looooooooooooord. O_O
replies(2): >>ehPRet+uG3 >>ehPRet+ja6
◧◩
15. thayne+r81[view] [source] [discussion] 2023-05-05 04:13:16
>>bowmes+rf
In fact the path method is deprecated, but I don't know if support will ever be removed, because some (old) buckets have periods in their names, and therefore don't work with the subdomain format.
◧◩◪◨⬒
16. easrng+Ub1[view] [source] [discussion] 2023-05-05 04:56:31
>>roblab+dp
But no browsers support 3rd-party plugins anymore. (I think the Chromium PDF viewer might be a plugin internally though?)
◧◩◪◨⬒⬓⬔⧯
17. ehPRet+uG3[view] [source] [discussion] 2023-05-05 20:45:16
>>ehPRet+Y31
impressive, but still haha
◧◩◪◨⬒⬓⬔⧯
18. ehPRet+ja6[view] [source] [discussion] 2023-05-06 19:14:25
>>ehPRet+Y31
https://twitter.com/subtee/status/1654858616065732609?s=12

in an interesting coincidence, I found this today!

[go to top]