/All/
|
index
catalog
recent
update
post
|
/math/
/tech/
/misc/
/free/
/meta/
/test/
|
Guide
light
mod
Log
P941
I hate fingerprinting
Thu 2022-05-19 02:03:11
link
reply
When is someone going to write a browser that can spoof its math engine and supported ciphers?
Referenced by:
P11990
P942
Thu 2022-05-19 02:27:09
link
reply
tls spoofing is an issue
>look like windows
>can only use broken windows suites
>one broken rc4 suite windows has on is the only thing the site supports
P970
Thu 2022-05-19 08:18:10
link
reply
If you spoof all the things your browser fingerprint becomes even more unique. The best you can do is use Tor browser with default settings except for security level turned all the way up.
Referenced by:
P795
P996
Thu 2022-05-19 13:24:22
link
reply
That's a cope, not a solution. Tor Browser sucks, mainly due to only supporting webextensions. We need a browser that spoofs everything to look like a completely different browser, even with Javacscript activated. Like the Secret Agent extension, but on crack.
Referenced by:
P1048
P1051
P998
Thu 2022-05-19 15:05:21
link
reply
durrrrrrrrrrrrr
P999
Thu 2022-05-19 15:09:53
link
reply
Rude.
P1048
Fri 2022-05-20 17:44:02
link
reply
P996
So you want to spoof firefox or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome or chrome ...
P1051
Fri 2022-05-20 21:00:53
link
reply
P996
Easiest way would probably be to randomly switch rendering engines for each page load. There's no way you're going to be indistinguishable from browser X with Javascript enabled unless you're actually running the same code.
P1093
Sun 2022-05-22 03:50:42
link
reply
Brave does randomized fingerprint. Tor thinks everyone should look the same, brave thinks you should constantly change, who is right
Referenced by:
P1095
P4419
P1095
Sun 2022-05-22 05:22:48
link
reply
P1093
neither they both depend too much on adoption to beat the dataset
might as well make the standards force this shit
its still better looking like a possible slight positive than not but splitting hairs is effectively snake oil
P1422
Sat 2022-06-11 10:54:23
link
reply
why do browsers even send these fingerprints in the first place?
Referenced by:
P1427
P1423
Sat 2022-06-11 12:20:21
link
reply
To flash their capabilities like css or js to http servers. Just like street whores.
P1427
Sat 2022-06-11 14:22:10
link
reply
P1422
According to
https://datatracker.ietf.org/doc/html/rfc1945
the reason for the User-Agent header was
>This is for statistical purposes,
>the tracing of protocol violations, and automated recognition of user
>agents for the sake of tailoring responses to avoid particular user
>agent limitations.
The User-Agent header was ultimately a disaster, with lots of browsers spoofing each other.
Then there are things like the Accept header, which advertises the kinds of file formats the browser can handle. It's used by many sites to decide whether to send you a WebP instead of a JPEG to save a few bytes of bandwidth.
But some parts of a browser's fingerprint are unintentional, and are just the result of slight differences in behavior between browsers.
Referenced by:
P4420
P1429
Sat 2022-06-11 18:14:16
link
reply
The server should be announcing its capabilities to the browser, not the other way around. If the server's capabilities exceed the browser, then the user can decide which action to take, i.e. change/upgrade browser or refuse to use the incompatible site/server.
Browsers leaking metadata is 100% intentionally done in bad faith. Don't believe any other offered (((explanation))).
Referenced by:
P1443
P1432
Sun 2022-06-12 04:09:38
link
reply
"Be flexible in what you accept" is a terrible philosophy if you want to avoid fingerprint-able differences.
Referenced by:
P1443
P64288
P1443
Sun 2022-06-12 20:29:18
link
reply
P1429
I don't think that fixes the issue. If the browser doesn't know how to deal with a feature, the server may be able to tell that the browser lacks the capability by the lack of follow-up requests. Although this suggests a solution: The browser shouldn't be automatically making follow-up requests at all. Instead everything needed to render a page ought to be delivered in a single response to the query for the page.
P1432
I can definitely see how this could cause a tension between privacy and pages "just working." But maybe "be flexible in what you accept" isn't as helpful as it's commonly thought to be. There does seem to be a move away from this philosophy in HTML parsing, first with the attempt at getting XHTML to take off, and then when that largely didn't happen, having the specification say exactly how you're supposed to parse broken HTML.
P1454
Mon 2022-06-13 12:40:10
link
reply
>everything needed to render a page ought to be delivered in a single response to the query for the page.
That used to be the case until (((embrace, extend, extinguish)))
Referenced by:
P1456
P1456
Mon 2022-06-13 12:53:11
link
reply
P1454
As far as I know the web didn't initially have the capability I'm talking about. You can do it now with data: URIs, but it's awkward for large files and delivers the content in the wrong order (text ought to load before images). The big disadvantage is that it breaks caching. Of course if you wanted to make anti-tracking your #1 priority above all else, you'd have to get rid of caching because it too can be used to track users.
Referenced by:
P1462
P1462
Tue 2022-06-14 17:43:45
link
reply
P1456
HTTP/2 has a better version
https://en.wikipedia.org/wiki/HTTP/2_Server_Push
but it still has the issue of re-sending files to the client that is already has cached.
P4365
Mon 2022-07-25 16:33:32
link
reply
Isn't RC4, SSL3/TLS1.0 ?
No one uses this anymore and it's disabled by default.
P4372
Mon 2022-07-25 21:12:41
link
reply
Gopher protocol doesn't have a browser-volunteering-things-about-itself step, you just send an item specifier string and the server sends back what was specified.
There was the idea of allowing clients to modify requests by adding additional strings after the request-finishing crlf, but you might as well just have different items so this was never adopted.
Relatedly, gopher does not have a mechanism for https. This is a feature as this thread indicates, and gemini's modification of gopher to just be web again is not good.
P4419
Wed 2022-07-27 10:08:08
link
reply
P1093
>brave
ISHYDDT
P4420
Wed 2022-07-27 10:11:11
link
reply
P1427
so it's basically to optimize on different browsers
P4795
Sat 2022-07-30 15:56:56
link
reply
Gemini or bust!
https://gemini.circumlunar.space/
Referenced by:
P4806
P4796
Sat 2022-07-30 16:03:11
link
reply
can you do gemini over tor or i2p?
P4806
Sat 2022-07-30 18:33:56
link
reply
P4795
gemini actually sucks (not that fluffy), as i read on some gemini page that there is a conflict of parties between supporters in-protocol cryptography handling and who thinks otherwise. situation is something like competing DoH, DoT and others. will gemini be supported by mozilla trannies? i'd rather poromote gopher.
Referenced by:
P5303
P4844
Sun 2022-07-31 04:02:16
link
reply
Identical vs random fingerprint, tor took the identical because imo its easier than wondering if random is truly random and if that will break more stuff. Its the same reason they leave js fully enabled by default, to make everything work even though its stupid unsafe and allows fingerprinting.
Brave does random but cant or hasnt done everything random yet leaving users still fingerprinted, and some things are randomized on windows but not linux, its a clusterfuck that doesnt really work.
Referenced by:
P4845
P4846
P4845
Sun 2022-07-31 04:14:00
link
reply
P4844
Post that somewhere other than here.
Referenced by:
P4859
P4846
Sun 2022-07-31 05:08:28
link
reply
P4844
Giving everyone an identical random distribution of fingerprints could be slightly better in theory than giving everyone a single identical fingerprint, in the situation where there's a lot of different implementations and no hope of getting them all to coordinate. With the random approach, it's possible that someone trying to fingerprint you could mix up two different implementations without the implementations having to coordinate with each other. Of course if you have bugs like
>some things are randomized on windows but not linux
it's a broken system that's actually making things worse.
P5214
Tue 2022-08-02 20:37:45
link
reply
Everyone should just use Google Chrome and not change any settings then fingerprinting wouldn't be a problem :)
P5223
sage
Tue 2022-08-02 22:03:29
link
reply
>hurr durr why dont they just fix one of the 10,000 fingerprinting vectors?
typical retard /g/ autist OP
P5224
GNU+Pony
Tue 2022-08-02 22:54:36
link
reply
30d2e795c9380668531771baec346b4bc75c52348ff6bc0d6effc8dd24bef398.png
316 KiB 553x738
>Everyone should just use Google Chrome and not change any settings than fingerprinting wouldn't be a problem :)
Everyone should block everything by default and selectively allow scripts via uMatrix, use Tor or I2P, and avoid all Cloudflare websites and then fingerprinting wouldn't be a problem ^_^
Referenced by:
P5225
P5266
P5277
P5225
Wed 2022-08-03 00:12:46
link
reply
P5224
Everyone should block all JavaScript, always, and never allow it via anything, use airgapped systems that aren't connected to the Internet, using a separate device which forces all traffic over Tor as a buffer, and avoid using any website when possible and then fingerprinting wouldn't be a problem.
Referenced by:
P5226
P5226
Wed 2022-08-03 00:33:30
link
reply
P5225
Everyone should burn themselves to ashes, eliminating all possibility of digital or physical forensics, and then fingeprinting wouldn't be a problem.
Referenced by:
P5257
P5257
Wed 2022-08-03 19:58:43
link
reply
80aa97b82751fef86cb7d4426ec87423105824c8aa88921d4b849b290c229bd2.jpg
658 KiB 1080x1080
P5226
Everyone should go back in time to kill their own mothers before they're conceived, eliminating their existence, and therefore all possibility of digital or physical forensics, and then fingerprinting wouldn't be a problem.
P5266
Thu 2022-08-04 04:59:28
link
reply
P5224
>avoid all Cloudflare websites
This but unironically. Tor and i2p prevent the sort of classical DDoS attacks. Of course this does come with the downside of when someone actually pulls off a DDoS attack of such a magnitude the whole Tor network suffers...
P5275
Thu 2022-08-04 21:06:14
link
reply
>f-f-f-f-f-FINGERPRINTS!!!!!!!!
just use anon stuff that ain't gay ffs, you'll be good
P5277
Thu 2022-08-04 21:12:29
link
reply
P5224
Go back to nanochan, ponyfaggot
Referenced by:
P5391
P5303
Fri 2022-08-05 19:08:47
link
reply
P4806
Gopher is cool for what it is, but what should we use when we want user interaction?
Referenced by:
P5394
P5394
Sun 2022-08-07 07:56:37
link
reply
P5303
Gopher is uniquely suitable for the modern internet over tor and i2p, since they handle security aspects of gopher's simple tcp connection, obviating legitimate uses of https.
<User interactivity:
The feature/"problem" is that gopher protocol doesn't let the server query/run anything on the client. The client initiates a tcp connection then sends a request and the server answers and that's it.
Gopher item type 7 is understood and generally implemented as being for general purpose CGI: The client sends its own message along with the item specifier. These are called moles.
There's also + for mirror/alternate servers, as has become standard between onion and i2p for places like l+j.
<You reeeeeally want some back and forth
There's item type 8 for telnet and T for tn3270, if you wanted them. I've never seen them in the wild and I don't know anything about telnet protocol. Has anyone used this/seen it used (and in what decade)?
P5227
This post brought to you by nanochan spacing
Referenced by:
P5419
P5650
P5901
P5416
Sun 2022-08-07 09:48:38
link
reply
could i do my banking over gopher?
Referenced by:
P5419
P5541
P5419
Sun 2022-08-07 14:10:03
link
reply
P5394
>Gopher item type 7 is understood and generally implemented as being for general purpose CGI: The client sends its own message along with the item specifier. These are called moles.
It's pretty limited compared to HTTP forms. Look for example at the people who have tried implementing imageboards on gopher. It can be done, but they use hacks like uploading images from URLs in a separate action from making a text post.
P5416
I think you could do it in principle if your bank offered it, but the moment you needed to do anything interactive like initiate a money transfer between accounts, it would get really inconvenient really fast.
Referenced by:
P5541
P5510
Mon 2022-08-08 16:47:03
link
reply
Have gopher development stopped?
Referenced by:
P5541
P5541
Mon 2022-08-08 20:47:12
link
reply
P5510
Yes it stopped 30 years ago with RFC1436. There was a set of ideas for unnecessary addons that violated the original principles named gopher+, but it was ignored. The gist was that the client would keep sending information after the CRLF that finishes the item specifier to provide context to the server: But you might as well just have a different item specifier.
P5416
A gopher connection to an onion or i2p address would be much safer and more private than an https clearweb connection.
Ignoring
P5419
's point that web-style text image embedding sucks, their point that gopher specifically forbids interactibility means gopher protocol has no way of getting a (yes-or-no-p "Delete your monero private key?").
Which leads us back to
P5494
: Gopher has a solution for interactability. Item types 8 and T are in effect- the item specifier is asking "give me a telnet session" or "give me a tn3270 session" [for interactibility]. I don't know what those are like. I'm vaguely aware nc(1) says it's like telnet(1) but scripts nicely and reports errors better. tn3270 is an attempt to provide a more sophisticated shell in the spirit of telnet, that is not like telnet(1) I think.
So for your banking there would be something like on the server:
TBanking session start-tn3270 monerobank.i2p 70
and the server would provide you a whatever tn3270 is interactive connection to (yes-or-no-p) your banking or w/e. tn3270 is its own thing; you are just requesting by gopher to get a connection like that.
telnet, like gopher does not include good cryptographic practices in its spec. This is smart, because reasonable practice quickly changes. Instead the crypto comes via i2p, whose job it is to make point to point communication private and safe.
P5548
Mon 2022-08-08 20:55:04
link
reply
/r/ does anyone have a reference for tn3270. I will have a look at telnet(1) and maybe make something.
Referenced by:
P5555
P5555
Mon 2022-08-08 21:09:08
link
reply
P5548
I guess it's this RFC.
https://www.rfc-editor.org/rfc/rfc1576
though there are many later RFCs for Enhancement like
https://www.rfc-editor.org/rfc/rfc2355
P5650
Tue 2022-08-09 17:45:31
link
reply
P5394
So tor over gother is possible? If it is,then what the hell are we doing here?
Sorry for retardation.
Referenced by:
P5689
P5690
P5901
P5689
Tue 2022-08-09 22:43:35
link
reply
P5650
Herd behavior? There was also this moment where one of the people that believed in freedom in a more anarchic way called some people that believed in freedom in a more libertarian way a Nazi over a joke in a way that affected tech media at the time, so there were drops of bad blood.
What is the gopher onion initiative? If inferiorchan stays dead we should go check over there, or start a colony in i2p in a similar way.
P5690
Tue 2022-08-09 22:53:04
link
reply
P5650
I read someone experimenting with this before. I might try an unlicensed knock-off of their code.
P5901
Sat 2022-08-13 00:23:06
link
reply
P5394
I've been saying this for ages now. Gopher is the perfect protocol for publishing static content over tor. Anything else can be done in a different protocol.
>online banking
Why? Use monero.
>anonymous discussion
Hidden usenet heirarchy
P5650
Yes. What the hell are we doing here? We should have a directory of hidden gopherholes by now.
Referenced by:
P6271
P6199
Mon 2022-08-15 00:42:07
link
reply
I'm going to debase this thread into my personal blog of digging a burrow and introducing a colony of gophers to i2p.
Some notes:
i2p: There's already the gopher onion initiative, who are not us.
The de facto 2? developer modern gopher server is gophernicus, which can be built for openbsd inetd with some odd unveil(2) and pledge(2)s.
This is pretty good, but it doesn't look enough like openbsd httpd.
So I'm:
1. tangentially, going to read that book someone published on web hosting openbsd
2. formally modelling relevant trivial behaviors of gophernicus
3. " openbsd httpd
4. Hard fork gophernicus and/or openbsd httpd using an axe
4. consciously breaking support with all non-openbased systems.
Will post weekly updates into this bread, if OP will forgive my subversion. I'm going to ballpark it at 4 weeks until airborne.
Comments, criticism welcome.
Other notes:
Lynx is the de facto browser for gophernicus (alternative to firefox plugin), though it extremely sucks and needs to be replaced. It runs a trivial conversion of text files into html, and then browses the html.
authorship- having a targettable author is a weakness. any and all creation is credited to an anonymous hacker. Read the code
Referenced by:
P6227
P6202
Mon 2022-08-15 03:30:07
link
reply
*The book is Httpd and Relayd Mastery. God I'm less dumb already
Referenced by:
P6213
P6213
Mon 2022-08-15 06:42:12
link
reply
P6202
sadly, the book didn't say anything else interesting to me after chapter 2.
Chapter 3 is a long spoken word version of patterns(7), then it talks about running wordpress sites in chroots, and then about relayd(8) load balancing. It's a good autobiography of a sysadmin though. I think he was playing a scripting-languages-I-hate version of Mornington Crescent. sh .. lua .. PHP .. ansible
So I guess I know a bit more about how httpd looks from the front, now to inspect its backend.
Afterward: >a lack of features /is/ a feature. Enjoy your peace and quiet.
P6227
Mon 2022-08-15 10:51:40
link
reply
P6199
>Lynx is the de facto browser for gophernicus
lol wat? i mostly see sacc(1) being recommended, and i find it much better than lynx to browse gopherspace. i also tried another one that i forgot the name, it was very quaint, it ran on the command line (no curses interface)
also there is another server called geomyidae that i use
i havent used gophernicus because when i was looking for a gopherserver i found geomyidae, and i can build with a simple `make`, unlike gophernicus that uses `./configure` autism
generally i find that ./configure is a sign of bloatware, simple software needs at the most extreme case one make recipe for each OS
geomyidae for example has the option to build it with or without without TLS support depending on which flags you set
tbh i dont even know what exactly ./configure is, i think it is something from autoconf (which i have only ever heard bad things about) that autogenerates a makefile, and i think this is dumb because you are autogenerating a thing that will then autogenerate an executable. why not autogen the exec directly?
P6271
Mon 2022-08-15 20:52:36
link
reply
P5901
>>anonymous discussion
>Hidden usenet heirarchy
Does anything like this exist already? Certainly there are ways to post to Usenet anonymously, but given that it's normal to post non-anonymously, and anyone still using it is desperately trying to filter out the spam, you're likely to be filtered by people's killfiles if you try to post to the Big 8 that way. I've seen alt.anonymous.messages, but it's all walls of PGP-encrypted text.
P6272
Mon 2022-08-15 21:12:41
link
reply
I think that sdf (if I knew what sdf was) uses gophernicus [gopher mole cgi]. Further, gophernicus has included some openbsd niceties, however awkwardly and as they say in their readme, you know, change unveil to what you want - hence the human-in-the-loop build, I think.
On the openbsd ports gophernicus build -> /usr/local/share/doc/gophernicus/README it suggests Firefox with OverbiteFF or else Lynx. That web book's author also liked Lynx funnily enough.
I see sacc in the ports tree, I will have a look at it too. sacc seems to be a gopher browser, whereas Lynx is an ancient kitchen sink terminal browser.
Gophermyidae I heard of somewhere too though I don't see it in ports. Is that what they like over at the onion gopher-people?
Referenced by:
P64293
P6284
Tue 2022-08-16 01:31:47
link
reply
i remembered the suckless (no relation) gopher browser: cgo(1)
check it out too
>sacc seems to be a gopher browser, whereas Lynx is an ancient kitchen sink terminal browser.
yea the reason i prefer sacc is because it was made specifically for gopher, so its way comfier for that than lynx
>Is that what they like over at the onion gopher-people?
i think so
i downloaded it off the bitreich.org's onion service, they have this directory called The Gopher Onion Initiative and there they recommend geomyidae as a server
it is a weird program because it doesnt have a config file, you configure it with command line arguments when you invoke, i just modified the init service they provided to read envvars off a file and use those as arguments
they tell you to use lynx there but i think it is because thats what people commonly have, on a different section they recommend sacc and clic (another client) to browse
i havent test clic, i dont remember what was it about it that bothered me, but whatever sacc is good enough for me, im not gonna waste my time with other clients unless they have something outstanding to show
i modified sacc to have it show more information on the status bar, it was pretty fun hacking it
i like software like that with a sauce thats easy to understand
anyway, try it out
torsocks git clone git://enlrupgkhuxnvlhsf6lc3fziv5h2hhfrinws65d7roiv6bfj7d652fid.onion/sacc/
or download it off the ports idk
have you seen their gopherhole yet? gopher://enlrupgkhuxnvlhsf6lc3fziv5h2hhfrinws65d7roiv6bfj7d652fid.onion
oh i dont know any gophers that pee, tell me some too
maybe openbsd doesnt have cgo, so here it is
https://github.com/kieselsteini/cgo/archive/refs/tags/v0.6.1.tar.gz
[spoiler:
yikes, github, i know
]
P6287
Tue 2022-08-16 01:44:10
link
reply
oh wait it was geomyidae that you couldnt find, sorry
torsocks git clone git://enlrupgkhuxnvlhsf6lc3fziv5h2hhfrinws65d7roiv6bfj7d652fid.onion/geomyidae/
P6296
Tue 2022-08-16 03:46:36
link
reply
Thanks for the links, I've never actually gone beyond the front page of their onion gopherhole because I didn't really think of a good way for me to use their IRC. I post on anonymous forums rather than live chats.
According to my todo list, next I'm meant to make a trivial behavioral model of some of the gopher server suspects.
Do you know if gophermyidae supports being run via inetd? If it does I'll cram it into the ensuing week too. And I'll try changing gopher browser by moonlight.
What do you think about i2p and/or/versus https? I don't ever want "exit node" traffic, so I could care less about that, but what about wanting to use https to encrypt traffic /to/ the socks5 proxy over a network. The gophernicus people add stunnel to running their gophers to get normal https crypto. I kind of want to say that if you're sending unencrypted traffic across a network irresponsibly it's not really my business.
Referenced by:
P6301
P6299
Tue 2022-08-16 04:07:28
link
reply
ff23eb2306820ecceae173aaf1091c1dbe0d664671103f4d472299022851068b.gif
22.2 KiB 220x123x2.60s
>a trivial behavioral model of some of the gopher server suspects.
huh?
>inetd
eh?
>changing gopher browser by moonlight
@_@
P6301
Tue 2022-08-16 04:19:05
link
reply
P6296
>What do you think about i2p and/or/versus https?
pretty comfy, like over tor
gopher was basically made for i2p
no encryption, but i2p is e2ee so it doesnt matter (would even be redundant), and very low bandwidth usage
>I don't ever want "exit node" traffic
yea leave that meme for tor
>https to encrypt traffic /to/ the socks5 proxy over a network
the proxy already takes care of the encryption, so why bother? plus, i2p's b32 address already take care of identity verification, so double pointless
has the tls madia already gotten into issuing .b32.i2p certificates? god i hope not
>The gophernicus people add stunnel to running their gophers to get normal https crypto.
wtf with the ./configure autism i thought they at least supported encryption
i mean, sacc has tls support so i figured some gopher servers independently implemented gophers://
>I kind of want to say that if you're sending unencrypted traffic across a network irresponsibly it's not really my business.
but im a hackerino, so it very much is my business wink wink
P8249
Thu 2022-09-01 17:41:57
link
reply
Is there a way to tell sacc to use less for text documents instead of more?
Referenced by:
P8250
P8262
P8250
Thu 2022-09-01 18:14:05
link
reply
P8249
You will have to edit the sauce. But it's pretty easy. Or use gayteways like a normal person, gopher is good for nothing anyway.
Referenced by:
P8262
P8262
Thu 2022-09-01 20:41:05
link
reply
P8249
yes you can do it like
P8250
said and edit the sauce directly or you could have just read and see that it calls the $PAGER environment variable when opening a text, so just set PAGER to less before calling sacc
but personally i just made it a variable on config.h
btw another annoying thing with sacc is the buffer size, it wont work if the gophermap you are trying to load is bigger than that
what i did was just define my own BUFFER_SIZE in config.h and replace every BUFSIZ in the source with it, so that it allocates enough memory for large holes
P8307
Fri 2022-09-02 00:57:47
link
reply
>Do you know if gophermyidae supports being run via inetd?
I've written such a program; here's the necessary information, over Gopher:
gopher://verisimilitudes.net/12019-03-30
The sacc client or whatever isn't so great; that's the Common Lisp client, right? I greatly improved it, as it was terribly written, but none of my changes were accepted due to being AGPLv3 and I later discarded them. Emacs clients are better.
Referenced by:
P8309
P54205
P8309
Fri 2022-09-02 01:16:51
link
reply
P8307
>The sacc client or whatever isn't so great; that's the Common Lisp client, right?
no, i think thats the other one
sacc is written in C
P54205
Tue 2023-08-15 15:03:10
link
reply
P8307
Gopher client:
gophuckyourself() { u=${1#gopher://}; echo /${u#*/?/} | nc ${u%%/*} 70; }
Gopher inetd server:
70 stream tcp nowait nobody /bin/cat cat /var/gopher/${1##*/}
Referenced by:
P54206
P54206
Tue 2023-08-15 15:10:04
link
reply
P54205
Ok so I'm retarded and fucked up the server. But it's nearly as simple. Obviously you're reading the selector on standard input not from argv.
#!/bin/sh
# in /usr/local/bin/poo
read sel
cat /var/gopher/${sel#*/}
# in /etc/inetd.conf
70 stream tcp nowait nobody /usr/local/bin/poo poo
Referenced by:
P54236
Mod Controls:
x
Reason: