Re: Hello
- In reply to: Dave Hayes : "Re: Hello"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 30 Nov 2021 22:36:42 UTC
I appreciate your kind words. I'd appreciate it even more if you spread
the word to check out my work. The more white-hat hackers who try to
hack my OS, the more confidence I will have that my modifications are as
good as I hope.
On 11/28/21 11:59 AM, Dave Hayes wrote:
> On Sat, 27 Nov 2021 18:26:43 -0500
> George Mitchell <george+freebsd@m5p.com> wrote:
>> On 11/27/21 17:40, Obsto Clades via freebsd-hackers wrote:
>>> If you are interested in checking out my OS, you can find instructions
>>> on my site's home page: https://obstoclades.tech/
>> Hmm, my mother told me never to click on links in strange emails ...
> Did your mother ever use cURL? :D
>
> prompt> curl -kv https://obstoclades.tech
> * Trying 209.181.137.95:443...
> * Connected to obstoclades.tech (209.181.137.95) port 443 (#0)
> ...
> * SSL connection using TLSv1.3 / AEAD-AES256-GCM-SHA384
> * ALPN, server accepted to use http/1.1
> * Server certificate:
> * subject: CN=obstoclades.tech
> * start date: Oct 16 20:04:54 2021 GMT
> * expire date: Jan 14 20:04:53 2022 GMT
> * issuer: C=US; O=Let's Encrypt; CN=R3
> * SSL certificate verify result: unable to get local issuer certificate (20),
> continuing anyway.
>
> It seems there's a problem with his certificate chain, but this is not unusual.
>
>> GET / HTTP/1.1
>> Host: obstoclades.tech
>> User-Agent: curl/7.77.0
>> Accept: */*
>>
> * Mark bundle as not supporting multiuse
> < HTTP/1.1 200 OK
> < Server: nginx/1.20.1
> < Date: Sun, 28 Nov 2021 19:50:00 GMT
> < Content-Type: text/html; charset=utf-8
> < Transfer-Encoding: chunked
> < Connection: keep-alive
> < Cache-Control: no-cache, no-store, must-revalidate
> < Pragma: no-cache
> < Expires: 0
>
> No obvious problem there. The only possibly questionable thing (other than
> jquery, which comes from google) is this:
>
> <script src="js/obstoclades.js" defer="defer"></script>
>
> which is this:
>
> /*
> * File: obstoclades.js
> * Copyright (c) 2017 Obsto Clades, LLC
> */
>
> $(document).ready(function()
> {
> var $content = $(".content").hide();
> $(".img").on("click", function (e)
> {
> $(this).parent().parent().toggleClass("expanded");
> var ttt = $(this).parent().children(".tooltiptext");
> if ($(this).parent().parent().hasClass("expanded"))
> {
> ttt.replaceWith("<span class=\"tooltiptext\">Click to
> close</span>"); }
> else
> {
> ttt.replaceWith("<span class=\"tooltiptext\">Click to
> open</span>"); }
> $(this).parent().parent().next().slideToggle();
> });
> var textHeight = $("#left-side-header-text").height();
> $("#old_english_sheepdog").height(textHeight).width(textHeight);
> $("#button").click(function()
> {
> $("#contactus-form").submit();
> })
> });
>
> There's nothing in that I can see that's malicious. I could be wrong.
>
> I looked briefly at the content. This person is trying to do good by security,
> so in my book it's worth a look. If said machine is actually impervious to
> sudo root, and all the compilers/interpreters work, that's likely going to
> work well. Am I missing something here?
--
Obsto Clades, LLC