As mentioned in my last entry, Livejournal have changed their url scheme to get around a problem in mozilla. The trouble is down to the -moz-binding CSS property. I’ll repost a copy of the short lived posting to the lj_dev community earlier.

Discussing the URL Change

As we recently announced in

news, we have changed the canonical URL of most journal, community, and syndicated content. While we did offer subdomains to Paid users in the past, this is now the canonical URL that we will link and redirect to for all journals. However, all communities are located at and syndicated accounts at Due to the way certain proxy servers are configured, and the fact that the HTTP RFC prohibits it, the canonical URL for journals with a username starting with an underscore will be We are however offering a free rename if you fall into this group.

So now the technical side of all of this and why it was a required change; bear with me as its 3am my time and I’m sitting in John F. Kennedy Airport after a five hour flight. Late last week we become aware that it was possible to use the “-moz-binding” CSS attribute within Mozilla and Mozilla Firefox to execute arbitrary offsite JavaScript. As this attribute is designed to allow attaching an XBL transform and JavaScript to any node within the DOM, it is quite easy to use in a malicious fashion. We immediately altered our cleaner to strip this attribute from entries and comments, though also realized that wasn’t even half the battle.

As we allow custom CSS in many of our styles, as well as the ability to link to an external stylesheet in a variety of fashions, it was quite possible to take advantage of this exploit and hijack the session cookie of any user who views your journal. As we, along with many other sites, used one cookie to authenticate a user, this cookie was quite powerful if stolen. If the user had not chosen to bind their cookie to their IP address, a malicious user could steal it, login as that user, deface the account and SPAM with it, as well as modify that user’s style to include the exploit thus causing this problem to spread much like a virus.

Borrowing the idea from another development team within Six Apart, we decided we needed to break our cookies into three categories. One cookie would be our application management cookie, this cookie would only be accessible on where we will not display untrusted content. A second cookie will be accessible on all subdomains of, though it only will say if you are logged in or not; it is solely for optimization. We then will issue one cookie for each journal you visit. This cookie will be only accessible on or as it is limited to a single journal. This cookie will only grant you the permission to read protected entries and post in the particular journal. This means that if the journal owner steals your cookie, they will be able to do nothing more than view their journal and comment upon it as if they are you. In the end you will have n+2 cookies, with n being the number of journals you visit.

Due to the fact that we cannot clean every external CSS stylesheet linked to every time we generate a journal page, this change is required. While it does not fully protect us from some new cross site scripting vulnerability that can be exploited via entries or comments, they are much easier to block, patch, and recover from quickly. With Mozilla deciding to allow the execution of arbitrary JavaScript via CSS, there is no other viable solution than the one we have undertaken. We developed a plan to phase all of this in over the next week, URL change first and then followed by the cookie change, though this morning we were made aware that this was being actively exploited. As such we took our week time line and shortened it to about twelve hours. While URLs have been changed at this time, our cookie handling change has not yet happened. This should however be expected to take place within the next day or two as well as various other cleanups and fixing bugs we’ve already encountered.

Please feel free to let us know if you have any questions and open a support request if you find a bug or encounter a problem. Sorry all of this came with just about zero warning, but in the end we could not wait longer to fix this problem.

Thanks to Daniel Silverstone for providing me with a cache copy of the text.

I’ve been meaning to post this for a couple of days. I discovered a
rather unintended and quite unexpected consequence of using a piece of
software. At work I use Workrave to enforce
breaks from the computer. For those that have never used it, workrave is
a little gnome applet that monitors your keyboard and mouse usage and
after about an hour of work locks your screen and gives you a 10 minute
break with a few exercises to reduce RSI. It also gives you microbreaks
of 20 seconds every 3 minutes of work, so you can look away from the
screen, stretch, whatever.. I should point out that it isn’t 20 seconds
every 3 wallclock minutes, but 3 minutes of using the mouse/keyboard and
isn’t quite as intrusive as it sounds.

I get to rest my eyes, prevent RSI annd take breaks. This sounds like
exactly the thing Workrave was written for. So what is unintended? It
turns out that the 20 seconds micro-break is just the right amount of
time to have a drink of water or get up and fill my glass if it’s empty.
Before I would forget to fill my glass up, but now I have time where I
can’t do anything on the computer. In the 30 minutes since I got in to
the office and started writing this entry I’ve had two micro-breaks and
drunk a pint of water. Workrave has managed to increase my water intake
during the day and as a result the number of toilet breaks. 🙂

I notice LiveJournal have
enforced http://<username> url scheme now to
prevent cross-site scripting attacks where people were stealling session
cookies and gaining access to accounts. Not sure what the exact problem
was, but I know of several attacks over the last week by one group of

Update: Appears the problem was in firefox. Explaination

Update: Nope, they pulled it. Basically mozilla allows you to execute
javascript via CSS stylesheets. I’ll update with any further URLs as
they become available.

you missed my point. I explicitly said not to get bogged down in my
example. The point is that changing the internal details of your class
shouldn’t result in your users being forced to change their code. As I
said, exposing your implementation tightly couples your code and your
users. As Matthew
pointed out, you shouldn’t have sets and gets for every item in your
class. You should have a clearly thought out api that isn’t tied to the
internal detail. Exposing internal, either through making data public or
blindly creating gets and sets for private data members is just bad
OO design.

An addition to my example that makes things little cleared would be a
subclass that validated the words you could use. With a public variable
I couldn’t enforce that, but I could override my setter to add

Imagine a Word class:

class WordA {
      char * word;
class WordB {
      char * word;
      void setWord(char * w) { word = w; }
      char * getWord() { return word; }

WordA worda;
worda.word = "WordA";

WordB wordb;

printf("%s %s", worda.word, wordb.getWord());

Fine, this works well. Now imagine that you want to change word from a
char * to a std::string to stop you dealing with
pointers. For the WordBclass you only need to change the
getWord function. You don’t need to change any of your class’s
users. For the WordA class, you have a problem because you can’t
automatically convert from a std::string to a char *,
so all your users have to change from object.word to

class WordA {
      std::string word;
class WordB {
      std::string word;
      void setWord(char * w) { word = w; }
      char * getWord() { return word.c_str(); }

WordA worda;
worda.word = "WordA";

WordB wordb;

printf("%s %s", worda.word.c_str(), wordb.getWord());

This is the punishment you get for exposing the internal details of
your class to your users. Please ignore any specific mistakes in my
examples; the principles work the same with different types.

Steinar, you use accessor rather than public data members because you
may need to change the behaviour of the class to do something when you
set a member variable. If you have all your data public, you can’t do
this. If you force people to go via a function, you can make changes to
the class without affecting its users. You have a similar issue with
inherited classes.

Jesus, not an email
gateway, but running a bulk spam-teaching script for spam assassin run
in an inappropriate directory, which insists on writing to disk despite
me clearly telling MIME::Parser to use internal memory
structures. I’ll just go stand in the corner.

Yesterday my employers, Runtime Collective, decided
that it might be a good idea if one of us attended GUADEC, and as I was
the only one that could make it, I am going on a trip to Stuttgart.
Yesterday afternoon was spent frantically hunting around for train
tickets. Managed to find tickets going out on Saturday evening and a
sleeper from Paris to Stuttgart arriving at 6:20 and returning Tuesday
night, Wednesday morning. Annoyingly we have seats on the overnight to
Stuttgart, but bunk beds on the way back. Fortunately, they had run out
of standard Eurostar tickets, so we get to go first class for the same
price. Should make up for spending 8 hours trying to sleep in a

Things in particular I want to see are keithp’s talk on the future of
X, Owen’s talk on Cairo and jdub’s talk on Project Topaz. Seeing as this
is a work trip, mjg59’s powermanagement, the Linux Desktop Migration and
the Public Sector Desktops will be required viewing too.

Oh and I’ve managed to drap lauranat along to be my official
translator, seeing as my only german phrase is likely to get me arrested
for perversion. That and the fact that she would have actually killed me
if I’d gone to Germany without her. Now I wonder if I can get work to
pay for her train ticket …

Who ever though that putting the default key for “exit without saving folder”
next to the key for “change folder” in mutt was a good idea deserves to
discover how goatse was produced. Personally.

/me goes to disable the exit keybinding

Update:For those interested in fixing it, put the
following in your ~/.muttrc.

bind pager x noop
bind index x noop

I’d like to apologise for those people reading my blog via Livejournal. I did a bit of
reorganisation last night, but made sure that both PyBlosxom (used on
my website) and Planet (used on Planet Debian) didn’t consider
them to be new posts. Sadly it appears that livejournal wasn’t so
clever and managed to mark them as new and spammed people’s friends

Sorry. I won’t do it again in a hurry.