Knowledge

:Knowledge Signpost/2016-04-01/Technology report - Knowledge

Source 📝

521:
that you could look and see you genuinely can't hack me with it, versus these things that have a new critical vulnerability whenever the old one expires. That said, I wouldn't be surprised if even the TELNET approach doesn't work against that Tor exploit, because (even if Snowden has never said a peep about it) I am suspicious that your saved uuencoded kiddie porn would be recognized by your friendly local antivirus program as a "threat", duly reported to their site, and it would upload a "patch" to you to help fix the virus, with predictable results. But I've never heard such a thing in the news ... and doubt I will this time either.
366: 121: 111: 36: 131: 91: 141: 101: 520:
true that TELNET had one clear advantage - it dates back to a time when program was program and data was data. There probably really isn't a special character sequence that indicates the following output should actually be saved and executed to take over your computer. I miss that kind of program
202:
Could the same thing happen to Knowledge? Absolutely. We follow industry standard best practice in keeping our servers secure, but this is in an industry where "best practice" means running code which is not known to be vulnerable. The more ignorant you are about the code you are running, the more
441: 114: 94: 134: 104: 144: 247:
port 23. If you care about security, maybe you shouldn't. Who knows what vulnerabilities are hidden in the Tor client? Maybe it's best to run the Tor proxy on a separate server in an air-gapped,
280:
lists only a single bug: "The source code is not comprehensible." Well, surely in 33 years at least one person must have comprehended it by now and reviewed it for security, right? Right?
213:
Of course, the tools of the trade are not restricted to law enforcement. Anyone with patience and talent can find and exploit vulnerabilities. So what do you do if you want to learn about
206:
Just about every layer of our software stack has had security vulnerabilities of one kind or another disclosed and fixed, and yet we keep using it, because there is no alternative. And
167: 77: 456: 597: 638: 676: 400: 737: 697: 651: 124: 353: 344: 720: 620: 509: 573: 555: 425: 410: 702:
Where do I submit feature requests? This needs to be more like the old www browser that put after each link and put a table-of-links at the end of every page.
420: 530: 405: 390: 395: 383: 493: 377: 55: 44: 805: 430: 192: 461: 468: 71: 477:
Hmm I feel some of the hardware hasn't been properly battle tested yet. Something a bit more old school might be a better choice:
233: 21: 780: 445: 647:
The temptation to actually download Tor and find if there's anything listening at that onion address is almost overwhelming.
775: 770: 283:
While you admire the pretty colours in your Linux console, you might reflect on the fact that they are brought to you by
765: 670: 682: 199:, the FBI seized control of a web server and then used it to compromise the browsers of visitors to the site. 714: 261:
One is to use old, small, well-tested code, generally recognised to be safe, in the desperate hope that with
760: 365: 49: 35: 17: 303: 611:
server? Or does Tim's refusal to consider "a web gateway to the Telnet server" answer that question? --
262: 591: 277: 276:
The BSD telnet client was written in about 1983, and is available in all major Linux distributions.
284: 248: 188: 544: 217:
but you don't want to expose your computer to complete compromise? Reduce the attack surface:
664: 634: 542: 686: 786: 751: 626: 588: 335: 657:
I thought "manpage" was a typo but the URL seems to suggest that's the correct spelling.—
8: 317: 243:
If you care about privacy, you should access the gateway via the Tor hidden service at
710: 616: 608: 551: 502: 452: 331: 196: 154: 725: 306:
security policy which denies all local access, running as an unprivileged user in a
733: 658: 630: 225: 292: 288: 316:
For more information about connecting and further technical details, please see
694: 648: 489: 480: 799: 569: 526: 516:
This may have comic aspects, but it is well informed and insightful. And it
214: 299: 258:
When it comes to choosing the Telnet client, there are two main approaches.
237: 703: 612: 547: 729: 690: 485: 210:
proves every year that there is no reason to trust our web browsers.
565: 537: 522: 30:
Browse Knowledge in safety? Use Telnet!: Set your Wayback Machine.
207: 166: 728:
is a reasonable place to put feature requests and bug reports.
323:
P.S.: please don't ask for a web gateway to the Telnet server.
307: 252: 222: 586:
client. Every session, for the best security. All the best:
270: 177: 232:
Sorry, there are no images, but you don't want them anyway,
180:
was a good start. But to be really secure, it's not enough.
324: 689:
for an nCurses-style Knowledge interface. A month later,
693:
built this simple scraper + telnet server in Node.js. —
625:
If they need a copy of the source, I recommend using the
266: 184: 334:
is lead platform architect on the parsing team at the
313:
We'll leave the details up to you. Stay safe, folks.
466:If your comment has not appeared here, you can try 681:If you're wondering what it looks like, check out 726:https://github.com/cscott/wikipedia-telnet/issues 221:Wikimedia is pleased to announce the launch of a 797: 298:The other approach is defense in depth. Perhaps 195:this week. In events reminiscent of the famous 251:room, connected only by an optically-isolated 152: 607:Hmm. So how long until Wikimedia provides a 481:https://www.youtube.com/watch?v=X9dpXHnJXaE 749:Make sure we cover what matters to you – 469: 72:Browse Knowledge in safety? Use Telnet! 14: 798: 265:. In this vein you might consider the 582:It's always better to write your own 54: 29: 683:my user page from nearly 5 years ago 564:no, that wasn't supposed to happen! 806:Knowledge Signpost archives 2016-04 27: 364: 203:secure you are. The mind boggles. 165: 56: 34: 28: 817: 451:These comments are automatically 263:enough eyes, all bugs are shallow 302:, with an extremely restrictive 139: 129: 119: 109: 99: 89: 287:code which interprets terminal 462:add the page to your watchlist 13: 1: 437: 325:That really misses the point 269:telnet client, running on a 255:link to your secure laptop. 18:Knowledge:Knowledge Signpost 7: 685:. In August, I created a 10: 822: 738:18:45, 28 April 2016 (UTC) 721:03:17, 27 April 2016 (UTC) 698:03:35, 17 April 2016 (UTC) 273:virtual terminal console. 677:20:11, 4 April 2016 (UTC) 652:10:51, 4 April 2016 (UTC) 639:21:45, 4 April 2016 (UTC) 621:20:25, 3 April 2016 (UTC) 598:19:30, 2 April 2016 (UTC) 574:22:51, 4 April 2016 (UTC) 556:22:38, 4 April 2016 (UTC) 531:14:38, 2 April 2016 (UTC) 510:21:23, 1 April 2016 (UTC) 494:21:05, 1 April 2016 (UTC) 187:'s attacks against the 459:. To follow comments, 369: 245:lgcjxm7fttkqi2zl.onion 234:libpng vulnerabilities 170: 39: 368: 357:"Technology report" → 169: 38: 627:Archie search engine 455:from this article's 336:Wikimedia Foundation 226:gateway to Knowledge 687:Telnet IEG proposal 349:"Technology report" 174:Telnet, circa 1988. 752:leave a suggestion 446:Discuss this story 401:WikiProject report 370: 171: 45:← Back to Contents 40: 719: 718: 601: 470:purging the cache 416:Technology report 291:while running in 197:Operation Onymous 69:Technology report 50:View Latest Issue 813: 789: 754: 730:C. Scott Ananian 708: 707: 673: 667: 661: 596: 585: 541: 508: 505: 473: 471: 465: 444: 426:Knowledge Weekly 411:Featured content 388: 380: 373: 356: 348: 289:escape sequences 246: 157: 143: 142: 133: 132: 123: 122: 113: 112: 103: 102: 93: 92: 62: 60: 58: 821: 820: 816: 815: 814: 812: 811: 810: 796: 795: 794: 793: 792: 791: 790: 785: 783: 778: 773: 768: 763: 756: 750: 746: 745: 671: 665: 659: 583: 535: 503: 500: 475: 467: 460: 449: 448: 442:+ Add a comment 440: 436: 435: 434: 421:Recent research 381: 376: 374: 371: 360: 359: 354: 351: 346: 340: 244: 175: 172: 162: 158: 151: 150: 149: 140: 130: 120: 110: 100: 90: 84: 81: 70: 65: 63: 53: 52: 47: 41: 31: 26: 25: 24: 12: 11: 5: 819: 809: 808: 784: 779: 774: 769: 764: 759: 758: 757: 748: 747: 744: 743: 742: 741: 740: 700: 679: 655: 644: 643: 642: 641: 604: 603: 602: 580: 579: 578: 577: 576: 513: 512: 450: 447: 439: 438: 433: 428: 423: 418: 413: 408: 406:Traffic report 403: 398: 393: 391:News and notes 387: 375: 363: 362: 361: 352: 343: 342: 341: 236:will own your 173: 164: 163: 160: 148: 147: 137: 127: 117: 107: 97: 86: 85: 82: 76: 75: 74: 73: 68: 67: 66: 64: 61: 48: 43: 42: 33: 32: 15: 9: 6: 4: 3: 2: 818: 807: 804: 803: 801: 788: 782: 777: 772: 767: 762: 753: 739: 735: 731: 727: 724: 723: 722: 716: 712: 705: 701: 699: 696: 692: 688: 684: 680: 678: 674: 672:contributions 668: 662: 656: 653: 650: 646: 645: 640: 636: 632: 628: 624: 623: 622: 618: 614: 610: 606: 605: 599: 594: 593: 590: 581: 575: 571: 567: 563: 559: 558: 557: 553: 549: 545: 543: 539: 534: 533: 532: 528: 524: 519: 515: 514: 511: 506: 498: 497: 496: 495: 491: 487: 483: 482: 478: 472: 463: 458: 454: 443: 432: 429: 427: 424: 422: 419: 417: 414: 412: 409: 407: 404: 402: 399: 397: 394: 392: 389: 385: 379: 372:In this issue 367: 358: 350: 339: 338: 337: 333: 328: 326: 321: 319: 318:the wiki page 314: 311: 309: 305: 301: 296: 294: 290: 286: 281: 279: 274: 272: 268: 264: 259: 256: 254: 250: 241: 239: 235: 230: 229: 227: 224: 218: 216: 215:dancing mania 211: 209: 204: 200: 198: 194: 190: 186: 181: 179: 168: 161: 156: 146: 138: 136: 128: 126: 118: 116: 108: 106: 98: 96: 88: 87: 79: 59: 51: 46: 37: 23: 19: 587: 561: 517: 484: 479: 476: 415: 396:In the media 384:all comments 378:1 April 2016 332:Tim Starling 330: 329: 322: 315: 312: 297: 282: 275: 260: 257: 242: 231: 220: 219: 212: 205: 201: 182: 176: 159: 155:Tim Starling 57:1 April 2016 787:Suggestions 691:User:cscott 660:Vchimpanzee 631:Praemonitus 453:transcluded 278:Its manpage 193:in the news 189:Tor network 592:Farmbrough 499:Good one! 310:in a VM. 249:soundproof 191:have been 83:Share this 78:Contribute 22:2016-04-01 781:Subscribe 695:Dispenser 649:Lankiveil 457:talk page 800:Category 776:Newsroom 771:Archives 715:contribs 347:Previous 125:LinkedIn 105:Facebook 20:‎ | 704:davidwr 613:llywrch 548:Bawolff 501:-- ] {{ 300:JTelnet 208:Pwn2Own 115:Twitter 609:gopher 584:telnet 308:chroot 293:Ring 0 253:RS-232 223:Telnet 135:Reddit 95:E-mail 766:About 486:©Geni 271:Linux 238:phone 178:HTTPS 16:< 761:Home 734:talk 711:talk 666:talk 635:talk 617:talk 589:Rich 570:talk 562:hell 552:talk 527:talk 504:talk 490:talk 431:Blog 355:Next 304:Java 183:The 145:Digg 713:)/( 675:• 566:Wnt 560:Oh 538:Wnt 523:Wnt 267:BSD 185:FBI 153:By 80:— 802:: 736:) 669:• 663:• 654:.* 637:) 629:. 619:) 572:) 554:) 546:. 529:) 518:is 507:}} 492:) 345:← 327:. 320:. 295:. 240:. 755:. 732:( 717:) 709:( 706:/ 633:( 615:( 600:. 595:, 568:( 550:( 540:: 536:@ 525:( 488:( 474:. 464:. 386:) 382:( 285:C 228:.

Index

Knowledge:Knowledge Signpost
2016-04-01
The Signpost
← Back to Contents
View Latest Issue
1 April 2016
Contribute
E-mail
Facebook
Twitter
LinkedIn
Reddit
Digg
Tim Starling

HTTPS
FBI
Tor network
in the news
Operation Onymous
Pwn2Own
dancing mania
Telnet
gateway to Knowledge
libpng vulnerabilities
phone
soundproof
RS-232
enough eyes, all bugs are shallow
BSD

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.