GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by daniel:// stenberg:// (bagder@mastodon.social)

  1. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Wednesday, 14-May-2025 07:27:09 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to

    yeah #curl has just 16 open issues. I'm a firm believer in not having a lot of open issues so we in fact never do. We work really hard on that. A project philosophy.

    In conversation about 14 hours ago from mastodon.social permalink
  2. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Wednesday, 14-May-2025 07:27:09 JST daniel:// stenberg:// daniel:// stenberg://

    Darn, we missed the opportunity for a celebratory cake when we passed 5,000 closed issues in the #curl project

    In conversation about 14 hours ago from mastodon.social permalink

    Attachments


    1. https://files.mastodon.social/media_attachments/files/114/502/755/152/650/037/original/65884620693bab29.png
  3. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Monday, 12-May-2025 19:39:49 JST daniel:// stenberg:// daniel:// stenberg://

    We have a CI job to spot unwanted utf8 letters in #curl PRs as we have noticed that GitHub will gladly show the for example (identical) Cyrillic version of a letter next to the Latin version in a diff and it is yes, entirely impossible for a human to spot the diff. I mean the diff is shown, but the significance of it is not.

    Changing just a single letter like that in a URL hostname opens up for a world of grief.

    In conversation about 2 days ago from mastodon.social permalink

    Attachments


    1. https://files.mastodon.social/media_attachments/files/114/493/947/428/006/981/original/f7e2ea8ce75f5e0e.png
  4. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Monday, 12-May-2025 17:13:44 JST daniel:// stenberg:// daniel:// stenberg://

    #Firefox is on #GitHub now: https://github.com/mozilla-firefox/firefox

    In conversation about 2 days ago from mastodon.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
      GitHub - mozilla-firefox/firefox: The official repository of Mozilla's Firefox web browser.
      The official repository of Mozilla's Firefox web browser. - mozilla-firefox/firefox
  5. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Sunday, 11-May-2025 06:22:30 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to

    So the user actually found a memory leak in #curl (using a fuzzer) and reported it correctly. All good.

    Then, in a follow up comment the user makes the ugly choice of trying to "help" us with this bug by asking an AI for help and proposing that as a solution.

    And again it broke horribly and the AI made up a broken patch that did not even fix the problem.

    Now that reporter is banned.

    In conversation about 4 days ago from mastodon.social permalink
  6. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Saturday, 10-May-2025 18:32:26 JST daniel:// stenberg:// daniel:// stenberg://

    AI_slop_counter++;

    In conversation about 4 days ago from mastodon.social permalink
  7. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Saturday, 10-May-2025 01:37:36 JST daniel:// stenberg:// daniel:// stenberg://

    What a week => https://lists.haxx.se/pipermail/daniel/2025-May/000111.html

    Mastodon, curl up, curlinfo, tpm2, rc1, AI, curlx, meta hash

    In conversation about 5 days ago from mastodon.social permalink

    Attachments


    1. https://files.mastodon.social/media_attachments/files/114/478/688/536/148/668/original/5a55bbe4f48f7483.jpg

  8. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Thursday, 08-May-2025 09:58:14 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to

    "in a world where everyone is striving to reduce their energy footprint, sticking to a library that operates at only a quarter of its predecessor's efficiency, and six to nine times slower than the competition, contradicts global sustainability efforts"

    In conversation about 6 days ago from mastodon.social permalink
  9. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Thursday, 08-May-2025 09:58:14 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to

    as the site is asleep, I'll offer the tldr: aws-lc is the fastest, wolfssl is number two, openssl is not very fast

    but read the post later, it is super long and detailed

    In conversation about 6 days ago from mastodon.social permalink
  10. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Wednesday, 07-May-2025 08:07:25 JST daniel:// stenberg:// daniel:// stenberg://

    The state of SSL stacks:

    https://www.haproxy.com/blog/state-of-ssl-stacks

    In conversation about 8 days ago from mastodon.social permalink
  11. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Tuesday, 06-May-2025 20:10:11 JST daniel:// stenberg:// daniel:// stenberg://

    I mentioned the #hackerone AI slop thing on #LinkedIn

    In conversation about 8 days ago from mastodon.social permalink

    Attachments


    1. https://files.mastodon.social/media_attachments/files/114/455/576/355/652/712/original/d88f99108fe4ab88.png
  12. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Tuesday, 06-May-2025 20:10:09 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to

    in case you care: https://www.linkedin.com/posts/danielstenberg_hackerone-curl-activity-7324820893862363136-glb1

    In conversation about 8 days ago from mastodon.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: static.licdn.com
      #hackerone #curl | Daniel Stenberg | 153 comments
      That's it. I've had it. I'm putting my foot down on this craziness. 1. Every reporter submitting security reports on #Hackerone for #curl now needs to answer this question: "Did you use an AI to find the problem or generate this submission?" (and if they do select it, they can expect a stream of proof of actual intelligence follow-up questions) 2. We now ban every reporter INSTANTLY who submits reports we deem AI slop. A threshold has been reached. We are effectively being DDoSed. If we could, we would charge them for this waste of our time. We still have not seen a single valid security report done with AI help. | 153 comments on LinkedIn
  13. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Monday, 05-May-2025 20:03:24 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to

    combined with new policy to instantly ban every reporter who submits issues we deem AI slop

    In conversation about 9 days ago from mastodon.social permalink
  14. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Monday, 05-May-2025 20:03:09 JST daniel:// stenberg:// daniel:// stenberg://

    reporter submits a hackerone report against #curl that includes "a crash in function NNN" with lots of complicated details.

    With the little detail that function NNN was made up and does not exist in real code.

    In conversation about 9 days ago from mastodon.social permalink
  15. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Monday, 05-May-2025 20:03:08 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to

    New input field added to Hackerone submissions for #curl

    In conversation about 9 days ago from mastodon.social permalink

    Attachments


    1. https://files.mastodon.social/media_attachments/files/114/450/293/012/135/637/original/da007ee6d6d0ad63.png
  16. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Friday, 02-May-2025 19:59:48 JST daniel:// stenberg:// daniel:// stenberg://

    Hello Prague

    In conversation about 12 days ago from mastodon.social permalink
  17. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Friday, 02-May-2025 19:51:45 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to

    Both these reports might be AI slop but we can't be sure - they lack some of the most obvious giveaways. People can be stupid without AI as well.

    In conversation about 12 days ago from mastodon.social permalink
  18. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Friday, 02-May-2025 14:58:11 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to
    • Sergio 🏳️‍⚧️ 🏳️‍🌈 :flagBi:

    @sergiotarxz sounds like working as intended

    In conversation about 12 days ago from mastodon.social permalink
  19. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Friday, 02-May-2025 06:20:59 JST daniel:// stenberg:// daniel:// stenberg://
    in reply to

    Same user followed up with a second severity HIGH security problem.

    "The --capath option in cURL and CURLOPT_CAPATH in libcurl accept any directory path without validation. If an attacker provides a custom CA path containing a fake root certificate, cURL will trust malicious HTTPS endpoints signed with that fake root."

    I'm fortunate to get to work with the best people 🤠

    In conversation about 13 days ago from mastodon.social permalink
  20. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Friday, 02-May-2025 06:08:59 JST daniel:// stenberg:// daniel:// stenberg://

    We got this "HIGH security problem" in #curl earlier today:

    "The -o / --output parameter in cURL does not restrict or sanitize file paths. When passed relative traversal sequences (e.g., ../../), cURL writes files outside the current working directory, allowing arbitrary file overwrite. In automated or privileged environments (CI/CD, root containers), this leads to Remote Code Execution (RCE), privilege escalation, and supply chain risk."

    Never a dull moment.

    In conversation about 13 days ago from mastodon.social permalink
  • Before

User actions

    daniel:// stenberg://

    daniel:// stenberg://

    I write curl. I don't know anything.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          5732
          Member since
          16 Aug 2022
          Notices
          535
          Daily average
          1

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.