/srv/irclogs.ubuntu.com/2020/01/18/#launchpad.txt

tomreynhmm, is it a known bug that launchpadlibrarian.net would return user uploaded plain text content as text/html content-type?  https://launchpadlibrarian.net/461085327/syslog02:35
alkisgHello, my builds at https://code.launchpad.net/~epoptes/+recipe/epoptes-stable fail with "You are in 'detached HEAD' state."04:58
alkisgIs this a launchpad issue, should I just retry later, or is it something on my side?04:58
alkisgHmm I wonder if it's related to tagging... "error: Entry 'debian/changelog' overlaps with 'debian/changelog'.  Cannot bind."05:00
alkisgOh sorry my bad, I forgot to update the epoptes-stable recipe after merging debian into master, I only updated the epoptes-proposed recipe05:03
wgranttomreyn: It will return the content type specified in the upload. That's why it's on its own domain, with only public content.18:27
tomreyna separate domain certainly breaks most attack vectors there. phishing remains possible.18:53
tomreyni.e. think forged sso login page.18:55
tomreynactually this reminds me of bug 1835964 (which i admit is really quite irrelevant nowadays)18:58
ubot5bug 1835964 in Launchpad itself "Prevent XSS due to MIME Type Sniffing bugs in old Internet Explorer" [Low,Triaged] https://launchpad.net/bugs/183596418:58
wgranttomreyn: We don't consider phishing on an alternate domain like that to be an interesting attack vector.19:19
wgrantIt's a compromise, like services like GitHub Pages, for example.19:19
wgrantAlternate 2LD19:19
tomreynwgrant: i see where you'Re coming from there. github pages is limited in what you can push to it, though, and i assume it would not be easy to host a forged github login page there.19:21
tomreyni.e. you can only push to it through their trimmed down jekyll fork.19:23
wgrantI don't think those restrictions manage to prevent any meaningful class of attacks.19:25
wgrantBut I haven't looked in a while.19:25
tomreyni haven't tried to find out. it's also probably outside the scope of their bug bounty for the same reasons you provided.19:26
tomreynwould you consider it abusive if i uploaded an (intentionally broken) proof of concept to show it to you or to link to it in a bug report?19:26
wgrantNo. It's been done before. But we would be very unlikely to consider it a valid bug.19:26
wgrantWe are entirely aware of this attack vector, so demonstrating it isn't useful, but also not forbidden.19:27
wgrantAnyway, I need to get on a plane.19:27
tomreynokay, then there's no use in posting it other than increasing the risk of those who shouldn't becoming aware of it. have a good flight.19:28
wgrant(slow boarding is slow. Looks to me like you can still push arbitrary content to GitHub Pages. Doesn't even have to run through Jekyll)19:39
tomreynoh, really, i wasn't aware, never tried.19:49
tomreynand apprently it's "we don'T care what you put there" mode in github.io's case: https://securityheaders.com/?q=https%3A%2F%2Fsha-mbles.github.io19:54

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!