Bitcoin Forum
April 25, 2024, 05:10:39 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Forum avatar is BROKEN  (Read 1185 times)
Wolf0 (OP)
Member
**
Offline Offline

Activity: 81
Merit: 1002


It was only the wind.


View Profile
June 16, 2013, 03:55:44 AM
Last edit: October 16, 2018, 03:20:18 AM by Wolf0
 #1

NaN.
Make sure you back up your wallet regularly! Unlike a bank account, nobody can help you if you lose access to your BTC.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714021839
Hero Member
*
Offline Offline

Posts: 1714021839

View Profile Personal Message (Offline)

Ignore
1714021839
Reply with quote  #2

1714021839
Report to moderator
1714021839
Hero Member
*
Offline Offline

Posts: 1714021839

View Profile Personal Message (Offline)

Ignore
1714021839
Reply with quote  #2

1714021839
Report to moderator
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
June 16, 2013, 02:35:16 PM
 #2

dynamic or offsite avatars are not allowed because they are not guaranteed to be SSL.

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
BadBear
v2.0
Legendary
*
Offline Offline

Activity: 1652
Merit: 1127



View Profile WWW
June 16, 2013, 05:54:09 PM
 #3

So upload it.

1Kz25jm6pjNTaz8bFezEYUeBYfEtpjuKRG | PGP: B5797C4F

Tired of annoying signature ads? Ad block for signatures
jackjack
Legendary
*
Offline Offline

Activity: 1176
Merit: 1233


May Bitcoin be touched by his Noodly Appendage


View Profile
June 16, 2013, 07:25:32 PM
 #4

So upload it.
I think the problem here is that he wants a PHP-generated (from his hashrate I suppose) picture as his avatar

Own address: 19QkqAza7BHFTuoz9N8UQkryP4E9jHo4N3 - Pywallet support: 1AQDfx22pKGgXnUZFL1e4UKos3QqvRzNh5 - Bitcointalk++ script support: 1Pxeccscj1ygseTdSV1qUqQCanp2B2NMM2
Pywallet: instructions. Encrypted wallet support, export/import keys/addresses, backup wallets, export/import CSV data from/into wallet, merge wallets, delete/import addresses and transactions, recover altcoins sent to bitcoin addresses, sign/verify messages and files with Bitcoin addresses, recover deleted wallets, etc.
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
June 16, 2013, 07:53:07 PM
 #5

dynamic or offsite avatars are not allowed because they are not guaranteed to be SSL.

So?
SO THAT'S THE REASON WHY YOU CAN'T USE IT.

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
June 16, 2013, 10:45:01 PM
 #6

WHO CARES IF IT'S NOT SSL? As a matter of fact, you CAN'T use https links in there, IIRC.
non https links =/= non https images. Images are loaded by default by browsers. If all the page's content is not loaded via https, it is possible for an attacker to eavesdrop or modify the page.

for more info, see: https://bitcointalk.org/index.php?topic=69891.0

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
🏰 TradeFortress 🏰
Bitcoin Veteran
VIP
Legendary
*
Offline Offline

Activity: 1316
Merit: 1043

👻


View Profile
June 17, 2013, 12:10:34 AM
 #7

I'm pretty sure a hostile image cannot inject JS to the page (for modern browsers of course). However, if you already know my IP, you can know when I read a post / etc.

Just buy a security certificate for your domain, that costs $9 and takes literally 10 minutes before you get a cert in email.

Proxy the image.

Total time taken:

15 minutes
Cost: $9
theymos
Administrator
Legendary
*
Offline Offline

Activity: 5180
Merit: 12884


View Profile
June 17, 2013, 03:08:50 AM
 #8

Having http images (or https images with invalid certificates) on an https site results in warnings on a lot of browsers. I allow it with [img] tags because they're more rare.

Some day I'd like to have something like:

Code:
[fetch]http://mining.com/my_stats.txt[/fetch]

which would cause the forum to periodically fetch the textual data from the given URL and insert it into the post. This is a very low priority, though.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
June 17, 2013, 02:39:12 PM
 #9

So, you're saying it's intentionally broken because some users might get warnings?
It's not "some" users, it's most browsers. And it's not "intentionally broken", it's a feature to prevent warnings and preserve https integrity.

If there is insecure content on a page...
on chromium based browsers, the lock symbol in the address bar will have a red strikeout
on firefox, there won't be a lock symbol
on internet explorer, the user will be asked whether to load the insecure content
safari, opera probably has similar warnings

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
crumbs
Full Member
***
Offline Offline

Activity: 210
Merit: 100



View Profile
June 17, 2013, 04:41:11 PM
 #10

But wait, don't we post pics from plain http sites like postimg.org?
[test for this board:]
and here's php-generated content from another site (reload page for new pic):


Edit:  nevermind, i see the browser warning.
tysat
Legendary
*
Offline Offline

Activity: 966
Merit: 1004


Keep it real


View Profile
June 18, 2013, 01:12:22 PM
 #11

So, you're saying it's intentionally broken because some users might get warnings?
It's not "some" users, it's most browsers. And it's not "intentionally broken", it's a feature to prevent warnings and preserve https integrity.

If there is insecure content on a page...
on chromium based browsers, the lock symbol in the address bar will have a red strikeout
on firefox, there won't be a lock symbol
on internet explorer, the user will be asked whether to load the insecure content
safari, opera probably has similar warnings

Okay, again, who cares? If you have a MITM on your connection, he can modify an image. Oh, noes!
You know what he can also do? He can proxy your connection, and connect using HTTPS to the site where you want to go, then send you HTTP data. No browsers will warn, it just won't show that the site is HTTPS, and most users won't notice.

Why does it matter so much?
jackjack
Legendary
*
Offline Offline

Activity: 1176
Merit: 1233


May Bitcoin be touched by his Noodly Appendage


View Profile
June 18, 2013, 04:52:10 PM
 #12

I think the amount of madness in this thread is nowhere related to the issue significance

Own address: 19QkqAza7BHFTuoz9N8UQkryP4E9jHo4N3 - Pywallet support: 1AQDfx22pKGgXnUZFL1e4UKos3QqvRzNh5 - Bitcointalk++ script support: 1Pxeccscj1ygseTdSV1qUqQCanp2B2NMM2
Pywallet: instructions. Encrypted wallet support, export/import keys/addresses, backup wallets, export/import CSV data from/into wallet, merge wallets, delete/import addresses and transactions, recover altcoins sent to bitcoin addresses, sign/verify messages and files with Bitcoin addresses, recover deleted wallets, etc.
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
June 18, 2013, 08:25:51 PM
 #13

Okay, again, who cares? If you have a MITM on your connection, he can modify an image. Oh, noes!
You know what he can also do? He can proxy your connection, and connect using HTTPS to the site where you want to go, then send you HTTP data. No browsers will warn, it just won't show that the site is HTTPS, and most users won't notice.
You clearly do not understand how https works. Since the page is loaded with https, all references to external resources will be secured against tampering. An attacker won't be able to modify the image link to a "proxy". The best he can do is intercept the request, but since he doesn't have the certificate, the browser will show a warning.

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
June 19, 2013, 02:34:17 PM
 #14

You clearly have no idea what you are talking about, because I've done it before. An attacker can strip out HTTPS. You should have checked out Moxie Marlinspike's SSLStrip before making yourself look like an idiot.
You clearly have no idea what you're talking about. A quick search of "SSLStrip" on google reveals:
Quote
It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links.
Too bad bitcointalk's traffic is in https. Next time, actually read your references so you don't end up looking like a dumbass.

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
June 19, 2013, 07:57:28 PM
 #15

I've actually USED SSLStrip before. Had you watched the demonstration, you would have noticed that SSLStrip does just what its name implies, that is, feed the victim HTTP data while connecting to the victim's intended destination using HTTPS to get the data. It works on PayPal, which is why they started fucking with Marlinspike.
How dense are you? Did you even read my argument? Bitcointalk's traffic is in https. HTTPS traffic can not be tampered with in transit, nor can it be downgraded. SSLStrip only intercepts http pages, and replaces any https references. The only attack you can do is intercepting a http bitcointalk request and preventing https upgrade. You can intercept any embedded http image requests, but the tampering will be limited to the image. Your claim of using SSLStrip are red herrings, so is your claim of being able to hack paypal because they do not refute my central point (SSLstrip is limited to http traffic). If you read the fucking documentation for sslstrip instead of glancing over the name, you would know that.

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!