Re: Hello
- Reply: Obsto Clades via freebsd-hackers : "Re: Hello"
- In reply to: George Mitchell : "Re: Hello"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sun, 28 Nov 2021 19:59:20 UTC
On Sat, 27 Nov 2021 18:26:43 -0500
George Mitchell <george+freebsd@m5p.com> wrote:
> On 11/27/21 17:40, Obsto Clades via freebsd-hackers wrote:
> > If you are interested in checking out my OS, you can find instructions
> > on my site's home page: https://obstoclades.tech/
>
> Hmm, my mother told me never to click on links in strange emails ...
Did your mother ever use cURL? :D
prompt> curl -kv https://obstoclades.tech
* Trying 209.181.137.95:443...
* Connected to obstoclades.tech (209.181.137.95) port 443 (#0)
...
* SSL connection using TLSv1.3 / AEAD-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=obstoclades.tech
* start date: Oct 16 20:04:54 2021 GMT
* expire date: Jan 14 20:04:53 2022 GMT
* issuer: C=US; O=Let's Encrypt; CN=R3
* SSL certificate verify result: unable to get local issuer certificate (20),
continuing anyway.
It seems there's a problem with his certificate chain, but this is not unusual.
> GET / HTTP/1.1
> Host: obstoclades.tech
> User-Agent: curl/7.77.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Server: nginx/1.20.1
< Date: Sun, 28 Nov 2021 19:50:00 GMT
< Content-Type: text/html; charset=utf-8
< Transfer-Encoding: chunked
< Connection: keep-alive
< Cache-Control: no-cache, no-store, must-revalidate
< Pragma: no-cache
< Expires: 0
No obvious problem there. The only possibly questionable thing (other than
jquery, which comes from google) is this:
<script src="js/obstoclades.js" defer="defer"></script>
which is this:
/*
* File: obstoclades.js
* Copyright (c) 2017 Obsto Clades, LLC
*/
$(document).ready(function()
{
var $content = $(".content").hide();
$(".img").on("click", function (e)
{
$(this).parent().parent().toggleClass("expanded");
var ttt = $(this).parent().children(".tooltiptext");
if ($(this).parent().parent().hasClass("expanded"))
{
ttt.replaceWith("<span class=\"tooltiptext\">Click to
close</span>"); }
else
{
ttt.replaceWith("<span class=\"tooltiptext\">Click to
open</span>"); }
$(this).parent().parent().next().slideToggle();
});
var textHeight = $("#left-side-header-text").height();
$("#old_english_sheepdog").height(textHeight).width(textHeight);
$("#button").click(function()
{
$("#contactus-form").submit();
})
});
There's nothing in that I can see that's malicious. I could be wrong.
I looked briefly at the content. This person is trying to do good by security,
so in my book it's worth a look. If said machine is actually impervious to
sudo root, and all the compilers/interpreters work, that's likely going to
work well. Am I missing something here?
--
Dave Hayes - Consultant - LA CA, USA - dave@dream-tech.com
>>>> *The opinions expressed above are entirely my own* <<<<
No system is any use if you merely possess it. Ownership
requires operation. No system is useful if one can only
experiment with it. For a system to be useful, it must be
correctly operated.