Avatar
dog's best friend
262d5a8a8201b6e0804087a9d26929935c7ac6682875b13fe24a5314a04a6cbf
Live, Laugh, Like and Subscribe

I don't mess around with breakfast

Anyone remember how everyone just had to have a bug guard or car bra?

The bugs didn't go away, we literally killed them all.

When was the last time you had to pull over just to get all the bugs off your windshield?

Replying to d4831f20...

nostr:npub1yck44z5zqxmwpqzqs75ay6ffjdw843ng9p6mz0lzfff3fgz2djlsngujmw Straaaaange choice of wording.

And whether VLAN 1 has an actual VLAN ID value stamped into the frame header or not is imatterial to your described situation.

VLAN 1 being untagged is still logically batshit insane.

Disagree, if you're gonna have VLANs then making VLAN 1 be anything untagged is perfectly logical. I wouldn't want them to be separate, that's just a headache.

Chaotic evil: if everyone's gear actually let you use VLAN 0 I'd want that to be equivalent to anything untagged

Replying to d4831f20...

nostr:npub1yck44z5zqxmwpqzqs75ay6ffjdw843ng9p6mz0lzfff3fgz2djlsngujmw What? No.... What? Huh? WTF?

This is not how VLANs work. Do you just, refuse to aknowledge the existance of VLAN pop and push operations, AKA.... access ports?

I can't even, what on Earth are you smoking?

You want all your access ports to be explicitly configured or not work, is what I mean. In case for some reason they're not admin down by accident

I'm far too lazy to monitor SNMP for this on my own network

Replying to d4831f20...

nostr:npub1yck44z5zqxmwpqzqs75ay6ffjdw843ng9p6mz0lzfff3fgz2djlsngujmw

For starters, it depends on which side of this ridiculous debate you happen to agree with. Some vendors say VLAN 1 is a tagged frame, with a vlan id of one on it. I agree with this stance, as does Juniper.

Other vendors consider VLAN 1 is an untagged frame. They often call this the "native VLAN." On some platforms, one is merely the default, and it can be changed.

On others, VLAN 1 is always an untagged frame.

I consider both of these to be incorrect. A VLAN is a VLAN, and requires a tag. VLAN 1 shouldn't be some special case.

The biggest offender here is Cisco. They have products that do all three of these cases. This is due to the fact that so many of Cisco's products come from aquisittions. But the effect is the same, their own catalog isn't consistent.

I honestly don't know how most other vendors go at this point, because it is just so much safer avoiding VLAN 1 entirely. I never even find out. Have numerous Calix and A10 devices on my current network, I have no idea how either treats VLAN 1.

I'm gonna go with VLAN 1 is an untagged frame otherwise you can't have endpoints hanging off a layer 2 switch without themselves being VLAN aware and tagging their own frames, right?

I have run into this before when I was doing networking at an ISP and completely forgot about it until now.

I like requiring that your management VLAN be something specific and blocking vlan 1 / untagged entirely ๐Ÿ˜ˆ

I have no doubt that companies push around sensitive data they've collected on us using XML. That's the type of insane bullshit you'd expect from bureaucracy.

Hey everyone, pretend this is a Github issue shitting on Google for destroying the web and please swarm it with ๐Ÿ‘ reactions so they might address this vulnerability.

Getting this fixed might actually prevent some corporation holding your personal information from being attacked and having the data stolen in the future.

https://github.com/erlang/otp/issues/7539

Wondering what other software out there is using xmerl and accepts public input and is vulnerable as a result.

May have to go digging through github later

nostr:npub108zt8c43ulvdwnax2txurhhr07wdprl0msf608udz9rvpd5l68ascvdkr5 nostr:npub108pv4cg5ag52nq082kd5leu9ffrn2gdg6g4xdwatn73y36uzplmq9uyev6 yeah, XXE. Means anything that can submit an XML document that the server parses can read arbitrary files on the server, same as the other issue. Actually worse if this doesnโ€™t require Auth. XXE is fixed by not using a shit and brain-damaged parsers, which nobody should be using. This is straight outta 2004.

Abandon hope, all ye who enter. Pleroma is fucked and was made by retards.

The XML parser we're using is the most mature one in the ecosystem and comes with Erlang, but they apparently didn't care to disable this by default.

yeah seriously, I was looking at this like "I remember patching and documenting XXE bugs in FreeBSD packages like 10 years ago, how it this still a thing? Shouldn't everything be hardened against this by default because of all the SOAP exploits everyone was screaming about around 2010?"

This design by committee shit is inexcusable.

Also, personally, I think it's inexcusable to leave libraries vulnerable by default because of being afraid of breaking backwards compatibility which I assume is the reasoning here.

This is our BIND moment.

We get to have a million annoying little CVEs because we're so popular and everyone wants to attack us.

Although that means inevitably a few years from now our reputation will be destroyed and everyone will write their own implementations so they can recreate the same bugs from scratch.

I think this is an important audit we should make as a community so we can free ourselves of this cruft.

If anyone out there has information about this being required by something on the Fediverse I'd like to know. I'll try to do some research on it this weekend...

Looks like Mastodon's XML parsing library Nokogiri has this functionality disabled by default if anyone is wondering.