this post was submitted on 27 Feb 2024
125 points (96.3% liked)

Selfhosted

40296 readers
271 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] biscuitswalrus@aussie.zone 21 points 8 months ago* (last edited 8 months ago) (21 children)

The messaging around this so far doesn't lead me to want to follow the fork on production. As a sysadmin I'm not rushing out to swap my reverse proxy.

The problem is I'm speculating but it seems like the developer was only continuing to develop under condition that they continued control over the nginx decision making.

So currently it looks like from a user of nginx, the cve registration is protecting me with open communication. From a security aspect, a security researcher probably needs that cve to count as a bug bounty.

From the developers perspective, f5 broke the pact of decision control being with the developer. But for me, I would rather it be registered and I'm informed even if I know my configuration doesn't use it.

Again, assuming a lot here. But I agree with f5. That feature even beta could be in a dev or test environment. That's enough reason to know.

Edit:Long term, I don't know where I'll land. Personally I'd rather be with the developer, except I need to trust that the solution is open not in source, but in communication. It's a weird situation.

[–] kogasa@programming.dev 10 points 8 months ago (20 children)

Frivolous CVEs aren't a good thing for security. This bug was a possible DOS (not e.g. a privilege escalation) in a disabled-by-default experimental feature. It wasn't a security issue and should have been fixed with a patch instead of raising a false alarm and damaging trust.

[–] surewhynotlem@lemmy.world 5 points 8 months ago (11 children)

It is WAY better to over report than under report. I don't want vendors to have a lot of ability to say "nope that's not a security problem, sweep it under the rug".

[–] ByteWizard@lemm.ee 0 points 8 months ago* (last edited 8 months ago) (1 children)

Ever hear of the fable "The boy who cried wolf"?

[–] surewhynotlem@lemmy.world 3 points 8 months ago

He cried Wolf and it turned out to be a fox. He gets a pass.

load more comments (9 replies)
load more comments (17 replies)
load more comments (17 replies)