Still working on understanding the kinks of microformats2 and webmentions but I’m starting to get the hang of this.

Most of this is supported by the amazing IndieWeb plugin collection for WordPress so much respect for people that roll their own.

Managing credentials with KeePassXC - Fedora Magazine by Marco Sarti (Fedora Magazine)
A previous article discussed password management tools that use server-side technology. These tools are very interesting and suitable for a cloud installation.In this article we will talk about KeePassXC, a simple multi-platform open source software that uses a local file as a database.The main advantage of this type of password management is simplicity. No server-side …

I like how this article about KeePassXC mentions the SSH agent integration [that is usually skipped in such articles]. Good stuff:

https://fedoramagazine.org/managing-credentials-with-keepassxc/

Today I run into domain abuse while working on a WordPress project due to a typo in the TLD. A foreign server happily served me the requested files but with spiced content. This looked unsuspicious at first glance.

Now this is something that doesn’t happen every day [to me]. I haven’t touched PHP and WordPress in years so I don’t have a workflow established for this any more. Today I got the job to upgrade some legacy system. So I checked out the project from git, configured some dnsmasq magic and launched a local PHP development server and browser.

I was astonished when the project came up in the zero profile development chrome and the first link I clicked opened a new tab presenting me with some scam ringing all alarm bells. I’m on localhost! And Linux! What happened? Do we have an infected project in our git repository? So I started digging.

This should all point to my local dev domain at 127.0.0.1 that has no public DNS records at all.

Wait, this doesn’t look right. Looks like I made a typo replacing the WordPress WP_HOME and WP_SITEURL in our local wp-config and got a doubled dot de. That’s not going to localhost but it’s still loading JavaScript files. No file came back with 404 – Not Found error so at first glance nothing suspicous happened beside the CSS looking weird. Most files were empty but with some exception – as you can see.

That’s not my expected source.

So I run that IP against the IP Abuse DB and it checked out with various reports including a “took over my blog” report. Yeah, I guess that happens when you’re going to login to your blog. This IP ships any file you request back to you but with it’s own flavoured JavaScript. That’s what happens when you do a typo and someone else is just waiting for this. And it happened to my dev setup since I made a search and replace without enough caffeine in my blood to spot the typo and without bothering to set up SSL and CORS for developing.

Requesting without “subdomain” results in an critical error.

So yeah.. you can throw any domain at this. It will happily serve malware, or spam or whatever it’s up to today. It’s just waiting for a typing error.

The 127.0.0.1 one is fetched by my local dnsmasq

There’s a lesson here. Watch careful what domain you really use. Don’t be lazy and make use of SSL/CORS even in development. I can’t help me from having some respect for this idea and there are probably others doing the same.

So I was making a montage full of native Linux games by Marc Di LuzioMarc Di Luzio (Medium)
…and then Valve dropped their Proton bomb

Did you know that you can play hundreds of games nowadays? Not just Windows through Proton – no. I’m talking about native games.

https://medium.com/@mdiluz/so-i-was-making-a-montage-full-of-native-linux-games-92ce12b21631

https://www.youtube.com/watch?v=3U8bLArlRXw

Disclaimer: Many of the snippets were contributed by me. @mdiluz did the fantastic job of wrapping everything up.