You are not logged in.
Regarding a tiny comparison on Debian Forums at:
http://forums.debian.net/viewtopic.php? … 59#p679387
So... It's still probably safer with the free grsec kernel (dappersec)... Sorely missing the protections from Meltdown and Spectre, but most other protectiions are in place. And pls. note that it's a dev from the KSPP team. Hardly biased towards grsec.
No, it's probably not... While I haven't sudied those in depth, it's probably the Meltdown and Spectre that are the most important to have countermeasures in your kernel against, and grsec/dappersec can't at this time, and there seem no interest from spender and PaX Team, the authors... and grsec/dappersec can't protect you from those...
I think I'm closing my engagement with what is left in the open FOSS world of grsecurity.
See also:
https://github.com/dapperlinux/dapper-s … -427653248
and
https://github.com/minipli/linux-unoffi … -427652732
Regards!
(quote by Iridium developer:)
miro wrote:...Reading this and the other comments makes clear that we need to improve documentation what and why we changed things. All the trk-xxx.iridiumbrowser.de hosts are there to find connections which we were not able to disable yet. All these end up at nothing (404 not found) and are not proxied in any way. Essentially Iridium browser should never contact them - if it does then it is a code path we have missed and a bug.
It is perfectly possible that they needed something like just a ping to figure out where else original Chromium leaks user data. That's why it was sufficient to them to just have that part of the info, and it is possible that they were not collecting user data.
The ip address 88.198.85.193 will take you to the Iridium page page, so I'm not sure what the dev is trying to convey there. I'm willing to believe that they aren't collecting data, but it is strange that it is clearly going to their page. I'm also not really interested in skimming any tcpdump packets, because, as you said earlier, the stream is encrypted (port 443), so I doubt there's anything substantial in the network stream.
Oh no, it's under encryption where most all is really happening!
I just wanted to confirm if it was reaching out at all. As I mentioned, whatever part of the code that's reaching out to 88.198.85.193 is not in the same place as it was when the ycombinator article was written, so I'm interested to find out where it is now, and what else it might be doing, based on the source code, not the tcp stream.
It's an interesting subtopic. But time in too short supply here...
They likely needed to find where their not completely spyware-purged Iririum still leaked user data...
I searched the other day, after learning about that ycombinator page on Iririum, but could not find the page somewhere under the https://torproject.org with the article by Mike Perry, the lead Tor developer... In which he explains how Chrome leaked user IP...
That was in the time when Chrome was considered for Tor instead of Firefox. Not afterwards...
Just telling this example for comparison to this Iridium episode...
It's the lead developer. The author of vanguards, if you're following Tor development...
It took a lot of brains to figure that leak, you know... That's programming... Wizards can hide lots of things in the code, and hide it well...
Regards!
https://www.croatiafidelis.hr/gnu/deb/l … 180924-07/
see previous posts for how to install it and other.
In view of:
It's stock iridium on openbsd, but you get the idea.
If anyone wants to run something a little more sophisticated than tcptrack, I'm all eyes. All of this further disincentivizes me from using chrome-like browsers for any reason.
What tcptrack is doing appears to me just one aspect of the deep packet analysis. E.g., it isn't extracting streams nor HTTP payload such as files as the browser gets them, nor, most importantly, decrypting SSL... But I may be wrong, as I judge from only what https://duckduckgo.com gave me:
https://duckduckgo.com/?q=tcptrack&t=h_&ia=web
tcptrack
Software
Tcptrack is a packet sniffer, which passively watches for connections on a specified network interface, tracks their states, and lists them in a manner similar to the Unix 'top' command (GPL, Internet, Utilities, Networking, Monitoring).
More at Freshmeat
So for aspects of the network analysis (stress is on some), even my scripts are much more useful... But I guess it's great for real time look into what is exactly now happening...
I think I should reply to the older post from siva.
miroR wrote:It's not clear how bad those "Replace URLs to Google services by URLs to our own server" was...
Not what I expected to read from someone so committed to projects like grsec. Am I in a coma...?
I didn't get what you mean when I glossed over it the first time... Also, time was and still is in short supply here...
This, and apparently --thing is, I'm still not into Iridium, no time found yet for it, so I can't state anything for certain here-- that's an Iridium dev talking there.
Let me paste it, it's from over at that same link ( https://news.ycombinator.com/item?id=9482689 ):
...
Reading this and the other comments makes clear that we need to improve documentation what and why we changed things. All the trk-xxx.iridiumbrowser.de hosts are there to find connections which we were not able to disable yet. All these end up at nothing (404 not found) and are not proxied in any way. Essentially Iridium browser should never contact them - if it does then it is a code path we have missed and a bug.
It is perfectly possible that they needed something like just a ping to figure out where else original Chromium leaks user data. That's why it was sufficient to them to just have that part of the info, and it is possible that they were not collecting user data.
See https://www.schneier.com/blog/archives/ … o_tra.html for details of a big hole in most browsers cookei handling.
Chris
I opened it up. Will read it offline. But, speaking of Bruce Schneier, there was an opportunity to buy non-DRM e-books of his
Three of My Books Are Available in DRM-Free E-Book Format
https://www.schneier.com/blog/archives/ … y_boo.html :
Humble Bundle sells groups of e-books at ridiculously low prices, DRM free. This month, the bundles are all Wiley titles, including three of my books: Applied Cryptography, Secrets and Lies, and Cryptography Engineering. $15 gets you everything, and they're all DRM-free.
I would have been willing to pay, but it vanished within not much longer than a week... Anybody got those?
NOTE: that's a digression, and while I thought hard if it is appropriate to ask about it here, and believe it is within the permissible, I accept whatever the admins/moderators decide, if they decide to the contrary.. Even delete this digression... Or if the option is offered, move it in Off-topic...
miroR wrote:Another one would be: I want SSL-logging, as I always want to check what happened online.
Anybody knows that would be workable with Otter?
You should ask Emdek about that on Otter's IRC channel.
I'll remember your advice... If I go that route. (I'm also considering Iridium. Ah, on a longer run. I work pretty slow...)
miroR wrote:[...]
UPDATE: I actually downloaded:
1d7058c1972442c72f0904c6b7f3ad9f25dbb11c257d918c857eb74ccb8031fe otter-browser-0.9.99.3-rc12-x86_64.AppImage
(the SHA256 is in view of verification; how do AppImage's verify?)
and only then took notice my openssl is too new. A no go for me, not messing with such important packages as openssl.The bigger problem is that Otter Browser requires at least Qt 5.10, which is not in ASCII. But if you had that, it would be possible to built it against openssl 1.1 as well, says the main developer. (I haven't tried that, though.)
Not a problem in testing (beowulf] that I run:
# apt-cache policy libqt5core5a
libqt5core5a:
Installed: 5.11.1+dfsg-8
Candidate: 5.11.1+dfsg-8
Version table:
*** 5.11.1+dfsg-8 500
500 tor+http://devuanfwojg73k6r.onion/merged testing/main amd64 Packages
100 /var/lib/dpkg/status
miroR wrote:But why are there no Debian packages?
One reason is probably that, up to now, the project has only published release candidates.
On a non-privacy-related side note: Otter also doesn't depend on Pulseaudio.
Great to know ! Thanks!
miroR wrote:It's not clear how bad those "Replace URLs to Google services by URLs to our own server" was...
Not what I expected to read from someone so committed to projects like grsec. Am I in a coma...?
You're fine.
Ah, grsec... I'm not an expert. And grsec really may be dying, the FOSS grsec, and Google taking over GNU/Linux security, which is a disaster. But the link in my signature is dead, because my participation in the thread is, for untold reasons, deleted... Where I was telling about it...
No geniuses to take up the FOSS grsec, or no way to get spender and pipacs to give us a boost... The meltdown and spectre are deadly flaws, and the FOSS grsec, the dappersec can't protect you from them...
Anyways,
...it's old. And it's unsolved...Anybody knows of a follow-up where that issue was better explained, cleared up?
I wouldn't necessarily say unsolved so much as "probably unexplored." The troublesome code, according to the user "skymt", is located in chrome/browser/history/web_history_service.cc. I don't see that file in the source code anymore. I skimmed through similarly-named files and didn't see any explicit URLs.
https://github.com/iridium-browser/irid … er/history
That's not to say that a similar function isn't embedded elsewhere in the source, though.One thing I have not yet tried (which I assume someone has, by now) is opening up a tcpdump session with iridium. I do have all telemetry disabled, to the best of my knowledge, so I'll be interested to see what can be found, and what happens when I use a blank config folder.
That was really what was missing in the analysis. I regularly examine tcpdump (actually I run my https://github.com/miroR/uncenz program whenever I'm online) sessions, and for what I understand (I can't tell for all events, such as where Javascript goes really complex), Pale Moon behaves well, of course, thanks to addons NoScript, UBlockO and Decentraleyes at work, as well.
[ I leave the below even though I'm sure you know it, for other readers ]
But to do any proper dumpcap or tcpdump sessions analysis, you have to have the SSL-key logging on. Else it's all encrypted, and you see nothing really -- unless you browse in HTTP... But I guess you know it, and you do have it on.
Pity I'm out of time, but I think I wish to look much deeper into Iridium, and possibly try to install it and use it.
Also I noticed at https://iridiumbrowser.de/downloads/debian:
Currently, this is how they recommend doing it:
wget -qO - https://downloads.iridiumbrowser.de/ubuntu/iridium-release-sign-01.pub|sudo apt-key add -
cat <<EOF | sudo tee /etc/apt/sources.list.d/iridium-browser.list
deb [arch=amd64] https://downloads.iridiumbrowser.de/deb/ stable main
#deb-src https://downloads.iridiumbrowser.de/deb/ stable main
EOF
sudo apt-get update
sudo apt-get install iridium-browser
But that's wrong way to do it... The first line, the "wget -qO ...". It's worth filing an issue on their Github or wherever they have it (writing in a rush, busy)...
The right way is...
It is how I explained in:
A repo serving Pale Moon
https://dev1galaxy.org/viewtopic.php?id=1972
(just: that Pale Moon is now too old, and not to be used that might be gotten from the links to my location there)
But I have not time to go and search... I't in the Debian Wiki how it needs to be done, with unofficial repos.
I suppose Iridium can be installed w/o D-Bus, can it?
Pity I'm very short on time for probably a few days...
Regards!
regarding Iridium browser, FYI
https://news.ycombinator.com/item?id=9482689
An interested read.
But it's old. And it's unsolved. It's not clear how bad those "Replace URLs to Google services by URLs to our own server" was... Maybe truly for the sake of fixing things...
Anybody knows of a follow-up where that issue was better explained, cleared up?
Anybody can show us what really happened by posting what s/he sniffed on the network while Iridium was contacting those servers? Did those really come up with 404 Not Found ?
Are packages from:
https://iridiumbrowser.de/downloads/debian
D-Bus free?
UPDATE/CORRECTION: I really meant: are they available for installing in a dbus-free system? Sorry.
UPDATE:
Ah, I see another thing is missing for me with the iridiumbrowser.de repo (*) linked above: can the repo be reached with tor? Anybody? I just can't tell how enjoyable the privacy of Tor is, for installing you packages. Wouldn't want to relinquish that...
(*) BTW the .de is just fine with me, a few important FOSS people have indicated Germany as a possibly leader in privacy
Apropos compiling: Another web browser (and a rather promising one) that can now be built without dbus is Otter Browser.
See:
True. It would run without D-Bus, as that code says.
Just wrote:
In search of a privacy oriented browser
https://dev1galaxy.org/viewtopic.php?id=2260#p11849
in regard.
Otter browser would be a good option. It's floss and on qt5, but it's required to compile it and install from source, since there is no .deb package.
https://otter-browser.org/
I'm currently using Pale Moon, and it works fine. My own build, from Steve Pusser's repo. There are topics on Pale Moon forums, if anybody is interested.
But Otter browser would supply one of the requirements for me: sans-dbus, for which see:
Refracta no-dbus experiment
https://dev1galaxy.org/viewtopic.php?id=2158#p11846
Another one would be: I want SSL-logging, as I always want to check what happened online.
Anybody knows that would be workable with Otter?
And then (currently on
https://github.com/OtterBrowser/otter-browser ):
Linux users can use the official AppImage version available on SourceForge. It is a single executable file that doesn’t need any dependencies to be installed. The AppImage version should run under any system installed after 2012 provided it has OpenSSL 1.0.x (not 1.1.x) and GStreamer 1.x (with codecs). The browser is also available in the repositories of a wide range of Linux distributions and *BSD systems. Read more on the dedicated wiki page.
(but I haven't reproduced all the links of the text)
And, I have:
# apt-cache policy openssl
openssl:
Installed: 1.1.0h-4
Candidate: 1.1.0h-4
Version table:
*** 1.1.0h-4 500
500 tor+http://devuanfwojg73k6r.onion/merged testing/main amd64 Packages
100 /var/lib/dpkg/status
UPDATE: I actually downloaded:
1d7058c1972442c72f0904c6b7f3ad9f25dbb11c257d918c857eb74ccb8031fe otter-browser-0.9.99.3-rc12-x86_64.AppImage
(the SHA256 is in view of verification; how do AppImage's verify?)
and only then took notice my openssl is too new. A no go for me, not messing with such important packages as openssl.
Also why have some distros stopped packaging it? E.g. the last PPA on Launchpad is 3 months ago...
UPDATE: no that's not an issue; that's just packagers working ona rare schedule, the thing is: some pages there ( https://launchpad.net/~otter-browser/+a … untu/daily ) are called daily. No worry...
But why are there no Debian packages?
Regards!
https://www.croatiafidelis.hr/gnu/deb/l … 180914-10/
see previous posts for how to install it and other.
https://www.croatiafidelis.hr/gnu/deb/l … 180820-16/
see previous posts for how to install it and other.
https://www.croatiafidelis.hr/gnu/deb/l … 180816-16/
see previous posts for how to install it and other.
Gentoo can be completely no-dbus because you get to compile ALL your packages.
Very true! I know that so well. Years building my Gentoo in different systems.
(Anyone is welcome to recompile all the debian/devuan packages that require libdbus*)
(The stress is again on: ALL [the debian/devuan packages].)
We are yet to see if a true non-dbus happens anywhere in the debian world of derivatives, or somewhere else, in such way that not such huge work is needed to accomplish that freedom, or if it does not happen anywhere in the whole GNU/Linuxdom, but only Gentoo.
Refracta-nodbus has libdbus-1-3 and libdbus-glib-1-2. I don't think they do anything except satisfy some package dependencies.
]
But that's the core dbus... Something from the heart of Gnome/RedHat... for the world domination that was to be...
A search for 'dbus' in /var/log/* shows some errors in the refractainstaller log and in Xorg.0.log.
Sometimes it downright spams the log in my beowulf Devuan. But I do hope those are innocuous.
refractainstaller_error.log:
D-Bus library appears to be incorrectly set up; failed to read machine uuid: Failed to open "/etc/machine-id": No such file or directory See the manual page for dbus-uuidgen to correct this issue.
Yeah, I see these all the time, such as when I start Wireshark...
Xorg.0.log:
(EE) dbus-core: error connecting to system bus: org.freedesktop.DBus.Error.FileNotFound (Failed to connect to socket /var/run/dbus/system_bus_socket: No such file or directory)
I'm not sure what question I'm supposed to answer from stevepusser's post.
This? libgtk-3-dev is installable in ascii. I tried to install it, but I already have the latest version.
Looking up more closely, my fault to have wandered there too much... and for not having a clear question about it myself...
I did install successfully libgtk-3-dev, and it did bring in libqt5dbus5 and not much more... (And I did build Pale Moon successfully, after bannishing gconf from build time dependencies...)
Ah... I thought we'd be having full sans-dbus in Devuan like Gentoo have (as option)...
Thanks for your always useful reply!
I've learned from Devuan DNG ML about this sans-dbus Refracta when it was released, and have been using it as rescue system. It works just fine!
Talking about dbus, I had issues evading to introduce dbus into my non-dbus system
( somewhat non-dbus, see:
sans-dbus in Devuan: low level core install of dbus remains
https://dev1galaxy.org/viewtopic.php?id=1825 )
about which Pale Moon build issues see at:
Building Pale Moon on Devuan fails 2
https://forum.palemoon.org/viewtopic.php?f=37&t=19763
but just search for Refracta, as I mentioned it a few times.
@fsmithred, is this no-dbus Refracta also libdbus-free as well?
(And also see there, in particular stevepusser was wondering about things that you could possibly known the answer too:
[ same topic as the of the already given link ]
https://forum.palemoon.org/viewtopic.ph … 94#p147227 )
https://www.croatiafidelis.hr/gnu/deb/l … 180810-06/
see previous posts for how to install it and other.
https://www.croatiafidelis.hr/gnu/deb/l … 180727-10/ (under https://www.croatiafidelis.hr/gnu/deb/l … -current/)
Tested on three machines (but MBO are of only two kinds). No issues.
Refer to previous post for tips if needed.
New stable packages:
https://www.croatiafidelis.hr/gnu/deb/l … 180710-21/
( https://www.croatiafidelis.hr/gnu/deb/l … c-current/ )
Any difficulty installing, pls. review previous long posts... (I'm probably too short on time currently)
It is the same info that I have, as I just posted at:
Re: Grsecurity/Pax installation on Debian GNU/Linux
http://forums.debian.net/viewtopic.php? … 41#p675341
(or would it be better that I simply paste it here, I don't know... The link, this time, should suffice).
The offered packages in the previous post (no issues have I had so far) are for any system hardware (well: x86_64 arch only).
The best way is surely, to compile. Nothing wrong with the other option. It's only that tailoring the compiled kernel for only your hardware reduces the huge attack surface.
While Dapper Secure Kernel Patchset (
https://github.com/dapperlinux/dapper-s … e/releases
) is still grsecurity, my script for newbies has changed to help new GNU-Debianers/Devuaners who want to look into kernel compiling.
So pls. look up:
https://github.com/miroR/grsec-dapper-compile/
I'm not sure, you might need to get dapper-linux PGP key from:
https://dapperlinux.com/contact.html
https://dapperlinux.com/matthew_gpg_public_key.asc
Regards!
The:
https://www.croatiafidelis.hr/gnu/deb/l … c-current/
now points to:
https://www.croatiafidelis.hr/gnu/deb/l … 180601-06/
That is the kernel package for Debian/Devuan that _may_ be worth trying out, bearing in mind the caveats of Dapper Linux patchset:
https://dapperlinux.com/
I.e. no meltdown protection, no spectre protection, currently no retpoline.
However, all the othe usual protection that grsec offered are there. And the kernel is up to date.
I am testing that kernel right now, it appears to be fine.
If you want to use it, pls. see previous posts, there are a lot of info how to dowload it, how to verify it, etc.
Regards!
It's Wed 4 Apr 16:26:28 UTC 2018 UTC...
No replies on https://forum.palemoon.org/viewtopic.ph … 50#p138438
And maybe nothing untill morning comes to the U.S. if they went to sleep. Hours of uneasy waiting...
EDIT: I can't believe I calculated as if the Earth revolved the opposite direction around the Sun than it does... It wasn't night, but it was morning or even early morning in the U.S. when I posted that question about mozconfig... (BTW, I can do complex things, but I sometimes fail on binary stuff, or completely simple stuff, such as I failed my driving exam 42 yrs ago on driving backwards ...Aarrgh!...)
IOW, it's full daytime still in the U.S, while night is drawing over Europe where I live... Just why not answer... How can I compile if I don't know I can at least get some of the options to the liking of a good part (and to no detriment to others) of Devuan users?
I'm not going to be compiling a dbus- nor pulseaudio- Pale Moon... They hopefully will support those options...
I'm not an expert but I think this would do it:
Change --enable-official-branding to --disable-official-branding and rename your package in debian/control to whatever name you like. I think so long as you don't use their artwork and don't call it palemoon you should be fine.
lf I remember the browser will call itself "New Moon" by default. That would seem ok in the meantime, but you'd want to rename eventually I think.
Otherwise just use the mozconfig they provide, but it will limit you to the defaults.
I see, but the better way is to try and get Moonchild and his friends confident of my packages and get them to allow the official branding to remain...
In case the few options that I'm pretty unwilling to change, and they're not so many, get a PASS from New Tobin Paradigm, see:
A Pale Moon repo for Devuan/Debian
https://forum.palemoon.org/viewtopic.ph … 38#p138438
which I hope they will, I am motivated to work more. Else... time wasted...
As far as changing the licence: The Iceweasel story is a sad example. It lost support completely (IIRC) from Mozilla.
And you don't get geniuses available for some core issues in any complex project just so easily (remember how the https://github.com/minipli/linux-unofficial_grsec/ still hasn't moved passed the specter/meltdown mitigations, geniuses to solve it missing or, being late to do it; if only it is the latter...). Some things about really complex projects, there's only a few people in the world who are able to do it (well, in real time, I mean)...
The support by Moonchild and his team is very close to indispensable. (Especially because we are not huge as Debian.)
I'm on edges. Reloaded that Pale Moon link above a few times only while writing here...
I also asked at:
A Pale Moon repo for Devuan/Debian
https://forum.palemoon.org/viewtopic.ph … 22#p138422
I hope this can be worked out. This is a browser that does not impose pulseaudio nor dbus, is fast, and they don't seem to work behind people's back with intrusional purposes.