BOOM

Jul. 4th, 2025 10:33 pm
jadelennox: Westing Game: a chess queen, a purple chessboard, fireworks, BOOM! (chlit: westing game:  boom)
[personal profile] jadelennox

I've been trying very hard to cheerful!post this week because I'm frequently struggling to breathe, as one does these days. You all know how it is. I was planning on posting from the perfect 4 July book (The Westing Game). But when I looked at the exact words of the quotation, it felt much too on the nose:

The sun has set on your Uncle Sam. Happy birthday, Crow. And to all of my heirs, a very happy Fourth of July.

So, okay, I thinks to myself. I'll quote my other favorite Fourth of July bit from the end. But when I looked it up, uh. That didn't feel any less apropos to the moment?

Turtle?"

"I'm right here, Sandy." She took his hand.

"Turtle, tell Crow to pray for me."

His hands turned cold, not smooth, not waxy, just very, very cold.

Turtle turned to the window. The sun was rising out of Lake Michigan. It was tomorrow. It was the Fourth of July.

Ah, well. Ready for a nice game of chess?

jadelennox: Girlyman's Nate, Doris, and cartoon fish: "My God, get away, you smell like fish heads." (girlyman: fishheads)
[personal profile] jadelennox

The full case name is "City of Eugene v. Debutante Society of Oregon", but the abbreviated version is fine too.

-- [personal profile] tahnan

Rebuilding journal search again

Jun. 30th, 2025 03:18 pm
alierak: (Default)
[personal profile] alierak posting in [site community profile] dw_maintenance
We're having to rebuild the search server again (previously, previously). It will take a few days to reindex all the content.

Meanwhile search services should be running, but probably returning no results or incomplete results for most queries.

pick-n-mix

Jun. 30th, 2025 03:39 pm
jadelennox: Elephants and giraffes comic: "I'm eating a whole leprechaun" (sgnp: leprechaun)
[personal profile] jadelennox

Poll #33308 choices of varying difficulty
Open to: Registered Users, detailed results viewable to: All, participants: 50


pick one science!

View Answers

space
30 (61.2%)

dinosaurs
19 (38.8%)

pick one plastic pal who's fun to be with!

View Answers

murderbot
12 (24.5%)

lieutenant commander data
19 (38.8%)

lieutenant commander murderbot
6 (12.2%)

murderdata
12 (24.5%)

pick one cat!

View Answers

a cat who does crimes
1 (2.0%)

a cat who does naps
3 (6.0%)

trick question, they're the same cat
46 (92.0%)

pick one poll type!

View Answers

radio button
10 (20.0%)

ticky boxes
24 (48.0%)

free text answer
2 (4.0%)

scientifically constructed and balanced poll with an IRB approval and crosstabs
14 (28.0%)

pick one brassica!

View Answers

brussels sprouts
10 (20.0%)

box choy
5 (10.0%)

cauliflower
7 (14.0%)

turnip
2 (4.0%)

kohlrabi
4 (8.0%)

mustard
5 (10.0%)

sauerkraut
4 (8.0%)

candytuft
1 (2.0%)

horseradish
9 (18.0%)

purple pickled horseradish, maybe with a little charoset
3 (6.0%)

pick one way to feel better!

View Answers

petting the cat
9 (18.0%)

eating cheese
1 (2.0%)

throwing your phone into the fires of mount doom
2 (4.0%)

medication
1 (2.0%)

looking at pictures of nebulas
1 (2.0%)

throwing the technology of your choice into the fires of mount doom
1 (2.0%)

petting this other cat
7 (14.0%)

doing crimes
5 (10.0%)

reading
6 (12.0%)

writing
2 (4.0%)

'rithmetic
0 (0.0%)

digging in the dirt
1 (2.0%)

listening to music
2 (4.0%)

being in the ocean
5 (10.0%)

throwing mount doom into the fires of mount doom, just to see if you can create a singularity via recursive destruction
7 (14.0%)

it's chopped onions all the way down

Jun. 28th, 2025 05:53 pm
jadelennox: Nate Borofsky: prickles and stars  (girlyman: nate borofsky beautiful boy)
[personal profile] jadelennox

"Academia: Staying Afloat" by Timothy Burke from the end of January made me feel warmer. It's about everything. AI slop. Fascism. Modern employment. Greed. The broad gesture at everything. Hope. Determination.

You are the right person to do what you do, know what you know, study what you’re going to study. You do it.

You are a lifeboat.

You are not the passenger being rescued from a shipwreck. You are the rescuer. Your skills, your knowledge, your experience reside in you. You have pulled them from the cold ocean where cruel and careless captains have set them adrift.

You are a lifeboat.

[personal profile] mjg59
Single signon is a pretty vital part of modern enterprise security. You have users who need access to a bewildering array of services, and you want to be able to avoid the fallout of one of those services being compromised and your users having to change their passwords everywhere (because they're clearly going to be using the same password everywhere), or you want to be able to enforce some reasonable MFA policy without needing to configure it in 300 different places, or you want to be able to disable all user access in one place when someone leaves the company, or, well, all of the above. There's any number of providers for this, ranging from it being integrated with a more general app service platform (eg, Microsoft or Google) or a third party vendor (Okta, Ping, any number of bizarre companies). And, in general, they'll offer a straightforward mechanism to either issue OIDC tokens or manage SAML login flows, requiring users present whatever set of authentication mechanisms you've configured.

This is largely optimised for web authentication, which doesn't seem like a huge deal - if I'm logging into Workday then being bounced to another site for auth seems entirely reasonable. The problem is when you're trying to gate access to a non-web app, at which point consistency in login flow is usually achieved by spawning a browser and somehow managing submitting the result back to the remote server. And this makes some degree of sense - browsers are where webauthn token support tends to live, and it also ensures the user always has the same experience.

But it works poorly for CLI-based setups. There's basically two options - you can use the device code authorisation flow, where you perform authentication on what is nominally a separate machine to the one requesting it (but in this case is actually the same) and as a result end up with a straightforward mechanism to have your users socially engineered into giving Johnny Badman a valid auth token despite webauthn nominally being unphisable (as described years ago), or you reduce that risk somewhat by spawning a local server and POSTing the token back to it - which works locally but doesn't work well if you're dealing with trying to auth on a remote device. The user experience for both scenarios sucks, and it reduces a bunch of the worthwhile security properties that modern MFA supposedly gives us.

There's a third approach, which is in some ways the obviously good approach and in other ways is obviously a screaming nightmare. All the browser is doing is sending a bunch of requests to a remote service and handling the response locally. Why don't we just do the same? Okta, for instance, has an API for auth. We just need to submit the username and password to that and see what answer comes back. This is great until you enable any kind of MFA, at which point the additional authz step is something that's only supported via the browser. And basically everyone else is the same.

Of course, when we say "That's only supported via the browser", the browser is still just running some code of some form and we can figure out what it's doing and do the same. Which is how you end up scraping constants out of Javascript embedded in the API response in order to submit that data back in the appropriate way. This is all possible but it's incredibly annoying and fragile - the contract with the identity provider is that a browser is pointed at a URL, not that any of the internal implementation remains consistent.

I've done this. I've implemented code to scrape an identity provider's auth responses to extract the webauthn challenges and feed those to a local security token without using a browser. I've also written support for forwarding those challenges over the SSH agent protocol to make this work with remote systems that aren't running a GUI. This week I'm working on doing the same again, because every identity provider does all of this differently.

There's no fundamental reason all of this needs to be custom. It could be a straightforward "POST username and password, receive list of UUIDs describing MFA mechanisms, define how those MFA mechanisms work". That even gives space for custom auth factors (I'm looking at you, Okta Fastpass). But instead I'm left scraping JSON blobs out of Javascript and hoping nobody renames a field, even though I only care about extremely standard MFA mechanisms that shouldn't differ across different identity providers.

Someone, please, write a spec for this. Please don't make it be me.

Profile

nathanjw: (Default)
Nathan Williams

November 2022

S M T W T F S
  12345
678910 1112
13141516171819
20212223242526
27282930   

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jul. 7th, 2025 10:50 pm
Powered by Dreamwidth Studios