So you basically have some apps running in the background (or foreground) that are making those connections.
But what is X11? Is that like Wayland? ;-)
The database is embedded in the program. Specifically, it is this file:
https://github.com/h2337/connmap/blob/master/connmap/resourc...
Presumably generated by the author with this Python script
https://github.com/h2337/connmap/blob/master/tools/get-ip-da...
Not even Scientology's Secret Advanced Technology OT III Level Xenu Body Thetan and their high payed lawyers know where 127.0.0.1 is!
https://en.wikipedia.org/wiki/Xenu
https://news.ycombinator.com/item?id=14954131
DonHopkins on Aug 8, 2017 | parent | context | favorite | on: Internet Draft: Let 'localhost' be localhost
There was the time that Keith Henson tried to explain the local loopback address to Scientology lawyers during a deposition...
http://www.cryonet.org/cgi-bin/dsp.cgi?msg=6289
Henson: (patiently) It's at 127.0.0.1. This is a loop back address. This is a troll.
Lieberman: what's a troll?
Henson: it comes from the fishing where you troll a bait along in the water and a fish will jump and bite the thing, and the idea of it is that the internet is a very humorous place and it's especially good to troll people who don't have any sense of humor at all, and this is a troll because an ftp site of 127.0.0.1 doesn't go anywhere. It loops right back around into your own machine.
https://en.wikipedia.org/wiki/Keith_Henson
Keith is also involved with cryonics at Alcor, and known for performing "a rapid conversion to neuropreservation [that] was done using a high-speed electric chain saw".
https://news.ycombinator.com/item?id=34066097
>My somewhat eccentric friend Keith Henson once performed the grisly task of "converting whole body to neuro", which the article mentions: downgrading some of Alcor's full-body customers to head-only by removing their heads from their bodies with a chainsaw, or as Alcore's illustrated report delicately explained, "a rapid conversion to neuropreservation was done using a high-speed electric chain saw."
Chapter 3, pp 76, "Heads Will Roll", pp 93-94:
https://gwern.net/doc/transhumanism/1990-regis-greatmambochi...
>[...] But then the Alcor Life Extension Foundation came to the rescue. It would take care of the frozen parents, essentially on a charity basis, but only on the condition that they could be “converted” first, which is to say, converted from whole-body to neuro, the latter being far less expensive than the former. “The same capsule that you put a whole body in,” Saul Kent once explained, “you can probably put twenty heads in.”
Then you can import it under geo/viking port:
doas pkg_add viking
Open Viking and just load the geo.json file from /usr/local/share/markers/OpenBSD.geojson
void refreshConnections() {
ssOutput =
popen("ss -atun4 | grep ESTAB | awk '{print $6}' | cut -f1 -d\":\"", "r");
if (ssOutput == NULL) {
printf("Failed to run ss command\n");
exit(1);
}
}
edit: ssOutput is a global variable which is read elsewhere.
wslh•6h ago
char mapFilename[256]; strcat(strcpy(mapFilename, getenv("HOME")), RESOURCES); strcat(mapFilename, mapName);
h2337•6h ago
floating-io•5h ago
That's just off the top of my head; I've not written in C in a while.
h2337•5h ago
floating-io•5h ago
As to what could be accomplished with an overflow? I don't know; I'm not in security, and I don't sit around thinking of possible uses for various bugs when it comes to compromising systems.
Perhaps the most important thing to realize, though, is that you're distributing software publicly. Your security situation may not be the same as your user's security situation. Assumptions should not be made.
Something to keep in mind.
h2337•5h ago
floating-io•5h ago
db48x•2h ago
sedatk•5h ago
An unprivileged app could run your app (say, with more privileges), with a very long `HOME` environment path, causing a buffer overflow, and potentially exploit it to use your app's privileges to do more stuff than it was supposed to.
Basically, you should never use strcpy and strcat and but use the secure alternatives like strcpy_s and strcat_s, even when you know the source buffer would never exceed the destination size.
h2337•5h ago
Isn't it a moot point if unprivileged app can already run anything with more privileges? In normal operation, connmap requires no special privileges.
sedatk•5h ago
You can dismiss that possibility of course. But, as a general habit, it's best to use secure alternatives instead of mulling over probabilities every other line.
As a positive side-effect, the change would make your app not crash on systems with long HOME env paths.:)
DonHopkins•4h ago
h2337•5h ago
josephcsible•5h ago
im3w1l•3h ago