473,778 Members | 1,759 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Javascript on steroids!


Would you like to display the weather,
stocks,movie listings or perhaps send someone an
SMS text message or fax?

Did you think Google or Yahoo maps was cool?

No matter the back end or third-party resource ,
chances are I could glue it all together
with simple javascript running in your page.

Want to know how it works , want to contribute,
want a turn key? say something!

I've been coding the internet since 1994 and
programming in general since before the advent
of the "PC".
Sep 9 '06
31 1785
drclue wrote:
>
It certainly would appear an arduous attitude
to jump out the box painting our efforts with such a broad brush.
I think it would have been better to introduce LAMPJack with a brief
description of how the technology works overall: your server, my
server, client browser and all the communcation between them. Then
people would have some idea why LAMPJacks are so cool.

Peter

Sep 12 '06 #11
runner7 wrote:
Ok, how do you programmaticall y send a particular keystroke to Firefox?
I do not mean detect a keystroke.

http://groups.google.com/group/comp....f185f19fb2d0f4
LAMPjack does not add anything that would
enhance ones ability to mimic keystrokes.

On the other hand, LAMPjack could in some cases
be used to route data from one place to another
including a form submission.

Being as the LAMPjack infrastructure counts
transactions/frequencies/sequences and other things,
one would need to get special permission to
do a lot of them otherwise in some cases
the account to might be flagged or disabled
by the infrastructure.





Sep 12 '06 #12
drclue wrote:
Richard Cornford wrote:
>drclue wrote:
>>Richard Cornford wrote:
Web site security is largely a matter of exercising and keeping
control where you have control, on your own servers. Letting a
third party inject scripts on the client is sufficiently risky to
make loud assertions of honesty, responsibility and safety
made by the providers of those scripts insufficient justification
for using them.

So let's all ditch our on-line banking , throw out the googlemaps,
turn off our javascript and join our friends huddled in an
undisclosed location, crying loudly about weapons of mass
destruction . :)

Why? Serving scripts from our own servers (and so being certain of
what will be in them) is hardly arduous.

It certainly would appear an arduous attitude
to jump out the box painting our efforts with such
a broad brush.
All I did was point out that in the hands of the unscrupulous a system
that asks sites to include client-side scripts originating on a remote
server could be used to inject arbitrary malicious scripts in a way that
was very difficult to observe, but may be seriously damaging for the
reputation of the web site's owners and the financial well being and
privacy of their users. That is just a fact, what can be done with
scripts injected on the client is anything that can be done by any
script on the page.
All the scripts in LAMPjack are delivered from our
LAMPjack servers which makes a certified LAMPjack
about as dangerous as a Googlemap.
Two things speak for the safety of google maps: 1. Google's reputation
(which you would hope they would not want to endanger), and 2. The
technical competence of google's developers. Given that google has a
long history of tolerating script injection the later is not much of a
reassurance, though as google will not be using Googlemaps to inject
malicious scripts (to preserve their reputation) no injections will be
possible until they start including advertising (and their developers do
appear to finally getting to grips with their script insertion
problems).
In order to even develop, submit or use a LAMPjack
script, one has to have a verified account and the
appropriate site and session keys.
Aren't the people who would be developing the scripts for your system
the ones creating the lures that will encourage the people who have web
sites to use the system? There is little significance in these two
groups having "verified accounts".
The target page would also have to cooperate
Yes, you cannot force alien client side scripts into a page, it has to
invite them in (a bit like vampires).

<snip>
Any potential Ads would be injected in a fashion
that precludes cross domain scripting into the
LAMPjack/Subscriber context,
Details?
as I agree that totally third party content needs
to be caged.
But you promise everyone that your position as a third party would never
be abused?
Those third parties could also use LAMPjack, but only
from their own context, so those ads would only pose
the same threat as every other ad we see on the internet.

As to monitoring activities , even *YOUR* site
logs every request, right down to my IP address,
And if I included a script that did it I could monitor every key stroke
the user made and broadcast it back to my server, speculatively test for
the ability to install software (and install things (read spyware) on
the client if the ability was exposed) and so on. Of course I have no
reason for monitoring password and reading credit card numbers as they,
if entered, are going to be sent to me anyway, but if a third party
could upload those scripts to sites I am responsible for then they may
see considerable value in what they could achieve.
so in order to avoid log files we all need to give
up using the internet at all and/or hunker down in
the dark nets and pay for fear by the month, which
still does not really protect anyone, but it sells.
That is a "slippery slope" argument that doesn't quite work.

<snip>
Would a system not using LAMPjack be 100%
secure? No. The only system that comes close
is one that's left in it's shipping carton and
never plugged in.
Are you saying that if you cannot be 100% secure you may as well be wide
open to anything?
The only system that comes close is one that's left in it's
shipping carton and never plugged in.

Even banks get hacked on an all to frequent basis,
so the idea is to make the security stiff enough
to exceed the value of the prize.

With a simple vise , a file , and a key, one can make
a master key for all locks of that type ...
<snip>

That is not at all true. A lock as simple as the Yale lock, for example,
has no master key at all, so no such object could be created.
My belief is that cross-domain scripting can in
conjunction with server side tools provide a reasonably
safe context in which to conduct it's activities.
Don't be ridicules. Your system is absolutely reliant on the owners of
web sites being willing in include scripts in their pages soured from a
third party server. At that moment client side security is already out
of the window. The only safety these web sites will have come from
exactly the same sources as Googlemap's; Your technical competence (and
you already know what I think of that), and your reputation (which is
not something I would hang a web site upon).

The problem here is that if your intentions were to exploit the gullible
and leach information form the user's of their web sties for your own
financial gain how would what you would then post in order to lure
people into using the system differ from what you have posted here?

Richard.
Sep 12 '06 #13
pe**********@gm ail.com wrote:
drclue wrote:
>It certainly would appear an arduous attitude
to jump out the box painting our efforts with such a broad brush.

I think it would have been better to introduce LAMPJack with a brief
description of how the technology works overall: your server, my
server, client browser and all the communcation between them. Then
people would have some idea why LAMPJacks are so cool.

My experience has been that a year's worth of food is best eaten
a bit at a time. I generally don't read nor respond to messages
of the girth that would be required to express the last years
development effort in one meal.
Sep 13 '06 #14
Richard Cornford wrote:
>With a simple vise , a file , and a key, one can make
a master key for all locks of that type ...
<snip>

That is not at all true. A lock as simple as the Yale lock, for example,
has no master key at all, so no such object could be created.
Please feel free to search for "bumpkey" which among other links
should explains the the simple physics involved in making
master keys for almost any lock relying on pin tumblers.

If you like I think that YouTube.com has several fine
educational videos on the subject.

So I will file your latest *it can't be done* claim with your
other comments of similar quality.


Sep 13 '06 #15
drclue wrote:
Richard Cornford wrote:
>>With a simple vise , a file , and a key, one can make
a master key for all locks of that type ...
<snip>

That is not at all true. A lock as simple as the Yale lock, for example,
has no master key at all, so no such object could be created.

Please feel free to search for "bumpkey" which among other links
should explains the the simple physics involved in making
master keys for almost any lock relying on pin tumblers.
<snip>

That device is not a master key it is a lock picking tool. I did not
say Yale locks were not easy to pick just that it is not possible to
make a master key for them. But if you need another example, how are
you going to make a master key for a 5 leaver Chubb lock?

Richard.

Sep 13 '06 #16
Richard Cornford wrote:
drclue wrote:
>Richard Cornford wrote:
>>>With a simple vise , a file , and a key, one can make
a master key for all locks of that type ...
<snip>

That is not at all true. A lock as simple as the Yale lock, for example,
has no master key at all, so no such object could be created.
Please feel free to search for "bumpkey" which among other links
should explains the the simple physics involved in making
master keys for almost any lock relying on pin tumblers.
<snip>

That device is not a master key it is a lock picking tool.
The Merriam-Webster Online Dictionary defines a "Master Key"
as "a key designed to open several different locks".
That's exactly what a bumpkey is.
I did not say Yale locks were not easy to pick just that it is not possible to
make a master key for them. But if you need another example, how are
you going to make a master key for a 5 leaver Chubb lock?
The Chubb looks to be a pin cylinder lock as opposed to
a pin tumbler lock. ( different animal ). If your interested
in such things I would direct you to a very entertaining resource
http://www.toool.nl/index-eng.php

The point is that security is more a deterrent than any kind
of guarantee, be it an internet service or your house's own
front door. The size and complexity of the lock or other
security mechanism needs to be inline with the item being protected,
which is why although most bathroom doors have a lock, they
are designed to the level of the prize ( Ones modesty ) in this case.

Likewise the various layers of LAMPjack security are aimed at
the level of the prize they protect, although most would be much
harder to bypass than the average house or businesses front door.

Even your local bank likely uses a plain old lock on the front door
as that guards the prize of the lobby, while a heavier security
is used on the vault where the actual money is.

In the LAMPjack system we defer things like credit card processing
to third parties like PayPal whose specialty is the bank vault side
of things. This allows us to keep the prize level down on LAMPjack
services while at the same time we are always looking for ways
to make LAMPjack security an ever increasing deterrent.

The API supports both sever encrypted site keys,
and sever encrypted session keys that can depending on the level
of deterrent required be unique for each transaction.



Sep 13 '06 #17
drclue wrote:
Richard Cornford wrote:
>drclue wrote:
<snip>
>>Please feel free to search for "bumpkey" ...
<snip>
>>
That device is not a master key it is a lock picking tool.

The Merriam-Webster Online Dictionary defines a "Master Key"
as "a key designed to open several different locks".
A lock picking tool is not a key.
That's exactly what a bumpkey is.
It is a device for opening locks of a particular type, that does not, of
itself, make it a key.
>I did not say Yale locks were not easy to pick just that
it is not possible to make a master key for them. But
if you need another example, how are you going to make
a master key for a 5 leaver Chubb lock?

The Chubb looks to be a pin cylinder lock
The 5 leaver Chubb lock is a leaver lock (with 5 leavers, surprisingly
enough). No pins and no cylinders.
... If your interested in such things ...
<snip>

No, my interest does not go beyond testing the veracity of your claim
that "With a simple vise, a file, and a key, one can make a master key
for all locks of that type". As you have now started evading the
question I assume you have realised that it was a false statement, as I
asserted.
The point is that security is more a deterrent than
any kind of guarantee, ...
<snip>

With your proposed system the issues are not keeping people out but
instead the owners of web sites inviting third party scripts in, and
then having the problem of how they are going to police those third
party scripts to ensure that they do not attempt to do anything
malicious to the site's users. Verbal assurances from the source of
those third party scripts are of no value in answering the question as
the dishonest will tell lies to achieve their ends.

Richard.
Sep 13 '06 #18
Richard Cornford wrote:
With your proposed system the issues are not keeping people out but
instead the owners of web sites inviting third party scripts in, and
then having the problem of how they are going to police those third
party scripts to ensure that they do not attempt to do anything
malicious to the site's users. Verbal assurances from the source of
those third party scripts are of no value in answering the question as
the dishonest will tell lies to achieve their ends.
You mean in a fashion similar to your quoting tactics designed to
reverse the meaning of a quote by taking it out of context?

We have a business plan that is based upon providing
users with successful transactions at a
fraction of a penny each or ad exchange , in which
case an advertiser pays the transaction costs.

Each transaction is backed by LAMPjack server logs
which can be audited against the client's and/or
advertisers web logs to assure via a source independent
of LAMPjack , that the transactions are valid and
not "made up".

Each LAMPjack is by nature "open-source" , so you , the client,
the advertiser or anyone else can examine the code to
see if there is any deviousness afoot.

Even the main LAMPjack javascript infrastructure files
are again by their very nature open source.

In a LAMPjack or even LAMPjack infrastructure , there
is really no place to hide a bad deed in the javascript.

This basically leaves the data that flows through
the server side. Ones LAMPjack login , the inputs to
proxy services like the weather, geocoders, stock and
news tickers ,shopping baskets and other while cool
services, not exactly the basis for a scam. At least not one
that could not be achieved far easier via other means and
at far less cost.

For the moment I'll assume your quoting behavior was simply born
of haste. I'm more than willing to have a *productive*
discussion about the general security aspects of LAMPjack
or even gasp the productive things you can do with it, but
the broken record of fear mongering is likely to brand you a troll.


Sep 13 '06 #19
drclue wrote:
Richard Cornford wrote:
<snip>
>... . Verbal assurances from the source of those third
party scripts are of no value in answering the question as
the dishonest will tell lies to achieve their ends.

You mean in a fashion similar to your quoting tactics designed to
reverse the meaning of a quote by taking it out of context?
Others can judge that for themselves.

<snip>
Each LAMPjack is by nature "open-source" , so you , the client,
the advertiser or anyone else can examine the code to
see if there is any deviousness afoot.
Inevitably they can look at the source, but if malicious injections
were kept to lowish percentage of actual request (and not server to
repeated request from the same IP address (within a period of, say, one
day), which is what a site owner may decide to do in order to verify
that there were no intermittent malicious injections, even though they
would be paying for the privilege) then the odds of detection would be
low (as the onus to detect would mostly be on non-technically skilled
browser users).

And there is the question of whether someone who is employing third
party scripts is qualified to identify a malicious script form its
(potentially obfuscated and compacted) source code.
Even the main LAMPjack javascript infrastructure files
are again by their very nature open source.

In a LAMPjack or even LAMPjack infrastructure , there
is really no place to hide a bad deed in the javascript.
Hide from who? If you are the one doing the injecting then you can
insert anything from any hidden/personal source you like.
<snip>
For the moment I'll assume your quoting behavior was
simply born of haste. I'm more than willing to have a
*productive* discussion about the general security
aspects of LAMPjack
No you are not. You want to suggest that everything is safe an above
board but you cannot deal with the problem that you system has the
potential to inject arbitrary scripts into the web pages of any web
site that uses it, and your assurances that it is safe would not differ
if your intentions were dishonest. Indeed your unwillingness to admit
that your system should be regarded as a security issue by its
potential users (the web site owning users), and that they should
expect some sort of verified and underwritten guarantees of your good
intentions (with draconian and enforceable penalty clauses if you
transgress), at minimum, speaks against your trustworthiness . As do
your continued efforts to deflect attention from my comments with
irrelevancies and your resorting to personal comments.
or even gasp the productive things you can do with it, but
the broken record of fear mongering is likely to brand you
a troll.
The potential exists, you don't have Google's reputation (at all, or to
defend) and your assertions that there are no security issues is not
reassuring, and is even suspicious in itself.

Richard.

Sep 13 '06 #20

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
10292
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
10061
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9923
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8954
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7471
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5368
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5497
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3627
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2860
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.