YAPC::Japan::Online 2022 ã§ã®çºè¡¨è³æã§ãã recheck:
Key features Clear output: you can tell easily whether anything is good or bad Ease of installation: Works for Linux, Mac OSX, FreeBSD, NetBSD and WSL/MSYS2/Cygwin out of the box: no need to install or configure something, no gems, CPAN, pip or the like. OpenBSD only needs bash to be postinstalled. Alternatively a Dockerfile is provided or you can just use docker run --rm -ti drwetter/testssl.sh F
ãµããª2020å¹´2æã«Google Chromeã¯Cookieã®ããã©ã«ãã®æåãsamesite=laxã«å¤æ´ãã¾ãããã2022å¹´1æ11æ¥ã«Firefoxãåæ§ã®ä»æ§ãå°å ¥ããã¾ããããã®å¤æ´ã¯ãã©ã¦ã¶å´ã§CSRFèå¼±æ§ãç·©åããããã®ãã®ã§ãç¹å®ã®æ¡ä»¶ä¸ã§ã¯ãã¦ã§ããµã¤ãå´ã§CSRF対çããã¦ããªãã¦ãCSRFæ»æãåããªããªãã¾ãããã®è¨äºã§ã¯ãããã©ã«ãsamesite=laxã«ã¤ãã¦ã®åºç¤çãªèª¬æã«å ããæè¿ã®ãã©ã¦ã¶ã®æåã®éãã«ã¤ãã¦èª¬æãã¾ãã ï¼2022å¹´1æ29æ¥è¿½è¨ï¼ æ¬æ¥ç¢ºèªããã¨ãããFirefoxã«ãããããã©ã«ãsamesite=laxã¯ãã£ã³ã»ã«ãããå¾æ¥ã®æåã«æ»ã£ãããã§ãï¼Firefox 96.0.3ã«ã¦ç¢ºèªï¼ãããã©ã«ãsamesite=laxèªä½ã¯å è¡ãã¦Google Chromeã«ã¦å®è£ ããã¦ãã¾ããããç´°ããæåã®å·®ç°ã§æ¢åãµã¤ãã«ä¸å ·åã
Firefox 87 trims HTTP Referrers by default to protect user privacy We are pleased to announce that Firefox 87 will introduce a stricter, more privacy-preserving default Referrer Policy. From now on, by default, Firefox will trim path and query string information from referrer headers to prevent sites from accidentally leaking sensitive user data. Referrer headers and Referrer Policy Browsers send
å©ç¨ãã¦ããã® PHP(Phalconã§ãããFWé¢ä¿ãªãèµ·ãããã¾ã) æ¦è¦ å æ¥ãæ¢åã®ã»ãã·ã§ã³ã¯ããã¼ã«secureå±æ§ã ã£ãããhttponlyå±æ§ãã¤ãã¦ãªããã¨ã«æ°ã¥ãã¾ãã¦æ¢åå®è£ ãä¿®æ£ãããã¨ãã¦ãã¾ããã FWã®æ©è½ã§ã¯ã»ãã·ã§ã³ã«å±æ§ãã¤ãããã¨ãã§ããªããã¨ãããããsession_set_cookie_paramsé¢æ°ãå©ç¨ãã¦ãã¼ã¿ãå ¥ãããã¨ãã¾ããã ãã®éãç§ã®èªèãçãã£ããã¨ãããããã¡ã¤ã³ã«HttpHoståãå ¥ãã¾ããããã¤ãlifetimeã®å¤ã«setcookieé¢æ°ã¨åæ§ã«time()ã足ãã¦ãã¾ãã¾ããã(ãã®çµææå¹æéã2071å¹´ãããã«ãªã) ä½ãèµ·ããã å ã ãã£ãdomain.localhostã®ã»ãã·ã§ã³ã¯ããã¼ã¨.domain.localhostã®ã»ãã·ã§ã³ã¯ããã¼ããã©ã¦ã¶å ã«ã§ãã¾ãããæ®éã¯ã§ããªãã¯ãã ã¨æãã®ã§ãããè²
Container Security Book â ï¸ãã®ææ¸ã¯è£½ä½ä¸ã®ãã®ã§ã About ãããã Linux ã³ã³ããã®ã»ãã¥ãªãã£ãå¦ã³ãã人ã®ããã®ææ¸ã§ãã æ®æ®µããã³ã³ãããæ±ã£ã¦ããããã³ã³ããã®åºç¤æè¡ãã»ãã¥ãªãã£ã«ã¤ãã¦ã¯åãããªãã¨ãã人ããããããç解ã§ãã足ãããã«ãªãããã«æ¸ããã¦ãã¾ãã 誤åè±åãééããªã©ããã° https://github.com/mrtc0/container-security-book ã« Issue ããã㯠Pull Request ãç«ã¦ã¦ãã ããã ãæè¦ããææ³ç㯠Twitter ããã·ã¥ã¿ã° #container_security ã§ãã¤ã¼ãããé¡ããã¾ãã License ãã®æ¸ç±ã«è¨è¿°ããã¦ãããã¹ã¦ã®ã½ã¼ã¹ã³ã¼ã㯠MIT ã©ã¤ã»ã³ã¹ã¨ãã¾ãã ã¾ããæç« ã¯ Creative Commons Attribution
ãã©ã¦ã¶ã®ã¿ããªã©ã«è¡¨ç¤ºãããFavicon(ãã¡ãã³ã³)ã¯ããµã¤ãã®ã·ã³ãã«ã¨ãã¦éè¦ãªã¢ã¤ã³ã³ã§ãããããããã®ãã¡ãã³ã³ã«ã¯Cookie(ã¯ããã¼)ã®ããã«ã¦ã¼ã¶ã¼ã追跡å¯è½ãªãã¹ã¼ãã¼ã¯ããã¼ãã®åé¡ãæ½ãã§ããã¨ãç 究è ããè¦éãé³´ããã¦ãã¾ãã Tales of Favicons and Caches â Persistent Tracking in Modern Browsers (PDFãã¡ã¤ã«)https://www.cs.uic.edu/~polakis/papers/solomos-ndss21.pdf supercookie ⢠workwise https://supercookie.me/workwise ãã¡ãã³ã³ã¨ã¯ããµã¤ãã®ã·ã³ãã«ãã¼ã¯ã¨ãã¦ã¿ããURLã®é£ãªã©ã«è¡¨ç¤ºãããå°ããªã¢ã¤ã³ã³ã®ãã¨ã§ãã ã¤ãªãã¤å¤§å¦ã·ã«ã´æ ¡ã®ã»ãã¥ãªãã£ã¼ç 究è ãã¯2021
æ¦è¦ è¦ç´ 詳細 èæ¯ åæ ã¤ã³ã¿ã¼ãããä¸ã«å ¬éãããdnsmasq LANå ã®ãã·ã³ãæ»æè ã®æ¯é ä¸ã«ãã LANå ã®ãã·ã³ã«æ»æè 管çã®Webãµã¤ããé²è¦§ããããã¨ãã§ãã å½±é¿ ä¸éè æ»æ æ±ææ¡å¤§ DDoS/Reverse DDoS CVE-2020-25684: ãã¼ãã®å¤éå CVE-2020-25685: èå¼±ãªCRC32ã®å©ç¨ CVE-2020-25686: åä¸ãã¡ã¤ã³åã«å¯¾ããè¤æ°ã¯ã¨ãªçºè¡ DNSãã©ã¯ã¼ãã«ãããã¬ã¹ãã³ã¹ã®æªæ¤è¨¼ çµã¿åããã ãã¡ã¤ã³åã®ç»é² ã½ã¼ã¹IPã¢ãã¬ã¹ã®å½è£ CRC32ã®è¡çª æ»æã®æµã ãã©ã¦ã¶ããã®æ»æ æ¤è¨¼ç«¯æ« æ»æã®æå確ç PoC fowarder cache attacker 大éã¯ã¨ãªã®éä¿¡ å½è£ ã¬ã¹ãã³ã¹ã®éä¿¡ é«éåã®è©± å®è¡ 対çã»ç·©åç ä½è« ã¾ã¨ã æ¦è¦ å æ¥DNSpooqã¨ããèå¼±æ§ãå ¬éããã¾ããã ww
ã¯ããã«Microsoftã¯èå¼±æ§ã®è¨ºæè¡çºãã»ã¼ããã¼ãã¼ã«ãã許å¯ãã¦ãã¾ãã æ¬è¨äºã¯ããã®ã»ã¼ããã¼ãã¼ãéµå®ããä¸ã§çºè¦/å ±åããèå¼±æ§ã解説ãããã®ã§ãããç¡è¨±å¯ã®èå¼±æ§è¨ºæè¡çºãæ¨å¥¨ããäºãæå³ãããã®ã§ã¯ããã¾ããã Microsoftãéå¶/æä¾ãããµã¼ãã¹ã«èå¼±æ§ãçºè¦ããå ´åã¯ãMicrosoft Bug Bounty Programã¸å ±åãã¦ãã ããã è¦ç´VSCodeã®Issue管çæ©è½ã«èå¼±æ§ãåå¨ããä¸é©åãªæ£è¦è¡¨ç¾ãèªè¨¼ã®æ¬ å¦ãã³ãã³ãã¤ã³ã¸ã§ã¯ã·ã§ã³ãçµã¿åããããã¨ã«ããVSCodeã®GitHubãªãã¸ããªã«å¯¾ããä¸æ£ãªæ¸ãè¾¼ã¿ãå¯è½ã ã£ãã çºè¦ã®ãã£ããé»è»ã«ä¹ã£ã¦ããéã«ãµã¨æãç«ã£ã¦microsoft/vscodeãçºãã¦ããæãCIç¨ã®ã¹ã¯ãªãããå¥ã®ãªãã¸ããª(microsoft/vscode-github-triage-actions)ã«ã¾
èå¼±æ§ãã¿ã¯äººæ°ããªããã¨ãéå»ã®å¾åããæããã§ãããèªåãéããã»ã©æåããã®ã§å¿ããªãããã«ãæ°åãå ¥ãã¦å¤§ä½ãæ¸ãã¾ããã è¦ç´ èæ¯ SAD DNSã®è§£èª¬ å ¨ä½å UDPã®ã½ã¼ã¹ãã¼ãã«ã¤ã㦠ICMP rate limit per-IP rate limit global rate limit Public-Facing Source Portã®ã¹ãã£ã³ Private Source Portã®ã¹ãã£ã³ æ»æWindowã®æ¡å¼µ ãµã¤ããã£ãã«æ»æã§UDPã½ã¼ã¹ãã¼ããæ¨æ¸¬ãã¦ã¿ã 対ç æ»æå®ç¾æ§ ã¾ã¨ã è¦ç´ ã¡ããã¨ç解ããã®çµæ§é£ããã¨ãã話ããã£ãã®ã§ãå ã«è¦ç´ãã¦ããã¾ããé°å²æ°ã ãã§ãæ´ãã§ããããã¨å¬ããã§ãã DNSãã£ãã·ã¥ãã¤ãºãã³ã°ã®æ°ããææ³ã¨ãã¦SAD DNSãçºè¡¨ããã ãã£ãã·ã¥ãã¤ãºãã³ã°ã®ããã«ã¯æ¨©å¨DNSãµã¼ãæ£è¦ã®å¿çãè¿ãããå ã«æ»æè ã
Don't Copy Paste Into A ShellWhen you see a shell command on the Internet, do not copy it into your terminal. Modern JavaScript Clipboard APIs allow a website to trivially overwrite what you put inside your clipboard, without the user's confirmation or permission. Here is an example of how easy it is to perform this attack. Imagine that the red text below is a shell command you want to use. Below
nginxã¨PHP-FPMã使ç¨ããWebãµã¼ãã¼ã¯ãç¹å®ã®æ¡ä»¶ä¸ã§ãã®æ¬ é¥ã«å¯¾ãã¦èå¼±ã§ãã èæ¯ 10æ22æ¥ãã»ãã¥ãªãã£ç 究è ã®Omar Ganievæ°ã¯ãPHPã®FastCGI Process Managerï¼FPMï¼ã§ããPHP-FPMã«ããããããããé©ç¨ãããã°ãããã®ãªã¢ã¼ãã³ã¼ãå®è¡ã®èå¼±æ§ã«é¢ãããã¤ã¼ããå ¬éãã¾ããã ãã®ãã¤ã¼ãã«ã¯ãèå¼±æ§ã®æ¦å¿µå®è¨¼ï¼PoCï¼ãå ¬éãããGitHubãªãã¸ããªã¸ã®ãªã³ã¯ãå«ã¾ãã¦ãã¾ãã Freshly patched RCE in PHP-FPM:https://t.co/kaVsCStBJx Exploit:https://t.co/VLmhxMWVxo Many nginx+PHP configurations vulnerable, watch out! â BECHED (@ahack_ru) October 22,
Exploiting the bug requires that the user have sudo privileges that allow them to run commands with an arbitrary user ID. Typically, this means that the userâs sudoers entry has the special value ALL in the Runas specifier. Sudo supports running a command with a user-specified user name or user ID, if permitted by the sudoers policy. For example, the following sudoers entry allow the id command to
Scott Helme Security researcher, entrepreneur and international speaker who specialises in web technologies. More posts by Scott Helme. A little while back I wrote a blog post about how "CSRF is dead". It focused on SameSite cookies, a powerful yet simple feature to protect your website against CSRF attacks. As powerful as it was, and as much as it will kill CSRF, you had to enable it on your site
1. Chrome ã§EV証ææ¸ã®çµç¹å表示ããªããªã ã¤ãã«GoogleããChromeã®URLãã¼ããEV表示ãåé¤ããæ£å¼ãªã¢ãã¦ã³ã¹ãåºã¾ããã Upcoming Change to Chrome's Identity Indicators EV UI Moving to Page Info ç¾å¨(2019å¹´8æ) Stableã®Chrome76ã§ã¯ã以ä¸ã®æ§ã«URLãã¼å·¦å´ã«EV証ææ¸ãå©ç¨ãã¦ãããã¨ã示ããçµç¹å+å½åã表示ãä»ãã¦ãã¾ãã Chrome76ã®EV表示 2019å¹´9æ10æ¥Stableãªãªã¼ã¹äºå®ã®Chrome77ããã¯EV表示ãURLãã¼ããåé¤ãããéµã¢ã¤ã³ã³ãã¯ãªãã¯ãã¦è¡¨ç¤ºãããPage Infoã«ãçµç¹åï¼å½åãã表示ãããããã«ãªãã¾ãã Googleã®ã¢ãã¦ã³ã¹ã§ã¯ã "on certain websites" ã¨æ¸ãã¦ãããã¨ããä¸æ°ã«ã§ã¯ãªã
Your SSL client is Probably Okay. Check out the sections below for information about the SSL/TLS client you used to render this page. Yeah, we really mean "TLS", not "SSL". Version Good Your client is using TLS 1.3, the most modern version of the encryption protocol. It gives you access to the fastest, most secure encryption possible on the web. Learn More Ephemeral Key Support Good Ephemeral keys
å æ¥twitterãè¦ã¦ãããããããªã¤ã¶ãããæè¦ãã¦ãå人çã«ä¾µå ¥ãã¹ãç³è«ã«ã¯è²ã æãå ¥ãã®ãã身ã§ãããããããã¯ãªãããã¨ãã診æå¡ãã§ãã ããï¼AWSã®ä¾µå ¥ãã¹ãç³è«ãããªããªãã¾ããï¼ pic.twitter.com/Z6ULU10SMyâ ä¸ãç¢ â=3 (@328__) March 1, 2019 ãã®ããã°ã§ãã¨ãããã¾ããããä»ã¾ã§AWSã¯ãããã¬ã¼ã·ã§ã³ãã¹ããèå¼±æ§è¨ºæãªã©ãå®æ½ããéã«ãAWSå´ã¸ã®äºåã®ç³è«ãå¿ è¦ã ã£ãã®ã§ãããä»åããªã·ã¼ã®å¤æ´ããã£ããããã©ãããä¸è¦ã«ãªã£ãããã§ãã ã¨ãããã¨ã§ãç§ãèªåã§ç¢ºèªããã¦ã¿ã¾ããã Penetration Testing - Amazon Web Services (AWS) ç¾å¨æ¥æ¬èªçãµã¤ãã¯ã翻訳ãéã«åã£ã¦ãªãããã§ã¾ã æ´æ°ããã¦ãªãããã§ããï¼2019/3/5確èªï¼ãè±èªçã®æ¹ã¯è¨è¼å 容ãã¬ã©ãª
AWS EC2ç°å¢ã§ã®DNS Rebindingã«ã¤ãã¦æ¤è¨¼ããã®ã§ç´¹ä»ãã¾ãã ã¾ãã¯ããååã¾ã§ã®ãããããã§ããå æ¥ä»¥ä¸ã®è¨äºã§SSRFæ»æããã³SSRFèå¼±æ§ã«ã¤ãã¦ç´¹ä»ãã¾ããã SSRF(Server Side Request Forgery)å¾¹åºå ¥é ãã®è¨äºã®ä¸ã§ã以ä¸ã®ããã«ç´¹ä»ãã¾ããã ãã¹ãåããIPã¢ãã¬ã¹ãæ±ããéã«ã以ä¸ã®åé¡ãçºçãã¾ãã DNSãµã¼ãã¼ãè¤æ°ã®IPã¢ãã¬ã¹ãè¿ãå ´åã®å¦çã®æ¼ã IPã¢ãã¬ã¹ã®è¡¨è¨ã®å¤æ§æ§ï¼åèè¨äºï¼ IPã¢ãã¬ã¹ãã§ãã¯ã¨HTTPãªã¯ã¨ã¹ãã®ã¿ã¤ãã³ã°ã®å·®ãæªç¨ããæ»æï¼TOCTOUèå¼±æ§ï¼ ãªã¯ã¨ã¹ãå ã®Webãµã¼ãã¼ããæ»æ対象ãµã¼ãã¼ã«ãªãã¤ã¬ã¯ããã ä¸è¨ã®TOCTOU(Time of check to time of use)åé¡ã¯ãDNSã®åå解決ã®æèã§ã¯DNS Rebindingã¨ãå¼ã°ãã¾ãã DNS R
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}