17.xhtml 4.9 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. <?php
  2. /**
  3. * <https://y.st./>
  4. * Copyright © 2015 Alex Yst <mailto:copyright@y.st>
  5. *
  6. * This program is free software: you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation, either version 3 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program. If not, see <https://www.gnu.org./licenses/>.
  18. **/
  19. $xhtml = array(
  20. 'title' => 'A mistake made and a plan to sign Web pages',
  21. 'body' => <<<END
  22. </p>
  23. It seems it was Jenny, not misted__, that <a href="/en/weblog/2015/03-March/17.xhtml">showed me the $a[PHP] functions on Sunday</a>.
  24. I have apologized, as well as added acknowledgement of the mistake to the correct weblog entry.
  25. </p>
  26. </p>
  27. I got distracted yesterday by research on canaries and forgot to mention that my <code>y.st.</code> hostmask was approved on <a href="ircs://irc.volatile.club:6697/">Volatile</a>, so when I am logged in, I look like I&apos;m coming from my domain despite the fact that I&apos;m actually coming from the $a[Tor] network.
  28. </p>
  29. </p>
  30. I decided to maybe add an automatic canary updater to my website&apos;s update script, though I don&apos;t know how that will be compatible with the decision to translate the update script to $a[PHP].
  31. Once I find the time to set this up, I&apos;ll know more.
  32. To insure that failing to update the canary is entirely passive (as to avoid breaking the law), I&apos;ll add a <code>--canary</code> or <code>--chirp</code> command line flag, and if not included when running the script, it simply won&apos;t update the canary.
  33. In order for the canary to not disappear from the site when not updated, it will likely need to have a separate compile directory that compiles it into the static files directory before doing anything else.
  34. Because automating the canary update process will require finding a way to $a[PGP] sign from within $a[PHP], I might as well sign all my pages at that time.
  35. It seems that there is no way to include the <code>-----BEGIN PGP SIGNED MESSAGE-----</code>, <code>-----BEGIN PGP SIGNATURE-----</code>, or <code>-----END PGP SIGNATURE-----</code> lines in $a[XHTML] comments and still have the page validate.
  36. This means that parts of the page will have to be outside the signed part of the page, which is unfortunate.
  37. I will likely sign only the content of <code>&lt;body/&gt;</code>.
  38. </p>
  39. </p>
  40. According to the <a href="https://canarywatch.org/faq.html">Canary Watch frequently-asked questions page</a>, the government allows an entity to disclose approved ranges of gag orders they have been served over six-month periods.
  41. These ranges are all ranges of one thousand and start at zero, for example, 0 - 999.
  42. You can guarantee that if I start posting a range of the number of gag orders I have received, that I have received at least one.
  43. This is because as long as I am not bound by one of these gag orders, I am free to ignore the ranges and admit that I have received exactly zero of them.
  44. The power to issue these gag orders has been abused by the government for a while now, and <a href="https://www.eff.org/issues/national-security-letters">the $a[EFF] is trying to raise awareness of it</a>.
  45. </p>
  46. </p>
  47. It seems <a href="https://gnso.icann.org/mailing-lists/archives/whois-tf2-report-comments/pdf00001.pdf">the $a[EFF] is concerned about the privacy implications of whois records in $a[DNS]</a>.
  48. I&apos;m in total agreement, domain names should be allowed to be registered anonymously without need of a proxy (such as a whois privacy service).
  49. </p>
  50. </p>
  51. It has been brought to my attention that Iceweasel blocks Web browsing on port 22 as well as other ports.
  52. I forget who showed me this, as I didn&apos;t write this entry until a couple days after I should have.
  53. I think it was mistedwind, but that&apos;s not important.
  54. I&apos;m not sure what the goal in doing this way, but supposedly, it&apos;s somehow for security.
  55. </p>
  56. </p>
  57. My last comment of the day is that I need to remember to stand up for everyone&apos;s rights, not just my own.
  58. I made a comment online about how I would be fine only being able to receive calls over $a[SIP] at my home server, as I never make any calls myself.
  59. Mistedwind reminded me that some people want to place calls from servers at their home addresses, and they have just as much right to place calls from home servers as I do to receive them from a home server.
  60. This was selfish of me, and I need to be more mindful of others in the future.
  61. </p>
  62. </p>
  63. My <a href="/a/canary.txt">canary</a> sings freely today, signafying that I am still not under a gag order.
  64. </p>
  65. END
  66. );