Blogs

Liferea: git master now has TinyTinyRSS podcast support

If you use TinyTinyRSS synchronization and care about podcast try git master (upcoming 1.11.0 unstable release) to also fetch podcasts!

Continuous Liferea git master builds with Travis CI

Today I set up Travis for Liferea git master. This should reduce mistakes like forgetting to add files or dependencies as well as testing compilation with LLVM.

I also converted the README to Markdown syntax and the new README.md now has a Liferea screenshot and a Travis build status badge looking like this:

Liferea Project Moved to Github

Today I closed the ticket tracker at Sourceforge the last remaining project tool there. Several maintainers and users already started using the new one at Github. Please also do!

If I set everything correctly the SF bugs should stay readable for everyone. You just cannot edit them anymore. I plan to close all of them with appriopriate results. In any case if you mind please reopen at Github:

https://github.com/lwindolf/liferea

Moving to Github simplifies my workflow a lot (especially the auto-linking of tickets by commits with ticket id) and less time will be spend on maintaining the tickets and more on the code and the actual issues to solve.

Also feel invited to make many many pull requests!

Invisible Tray Icon in Ubuntu Unity 14.04

If you are using Ubuntu Unity as desktop environment and after upgrading to Ubuntu 14.04 the tray icon disappears please workaround by running:

gsettings set com.canonical.Unity.Panel systray-whitelist "['all']"

TheOldReader Categories Support in Liferea git master

Git master now features categories support when subscribing to theoldreader.com accounts. As TheOldReader allows only level of folders nested folders are not possible. Still this allows to organize the feeds neatly. If you already have a subscription don't worry your feeds will be automatically reorganized without loosing any items.

The TheOldReader category support will be first included in release 1.11.0

How Common Are HTTP Security Headers Really?

A recent issue of the German iX magazin featured an article on improving end user security by enabling HTTP security headers

  • X-XSS-Protection,
  • X-Content-Type-Options MIME type sniffing,
  • Content-Security-Policy,
  • X-Frame-Options,
  • and HSTS Strict-Transport-Security.

The article gave the impression of all of them quite common and a good DevOps being unreasonable not implementing them immediately if the application supports them without problems.

This lead me to check my monthly domain scan results of April 2014 on who is actually using which header on their main pages. Results as always limited to top 200 Alexa sites and all larger German websites.

Usage of X-XSS-Protection

Header visible for only 14 of 245 (5%) of the scanned websites. As 2 are just disabling the setting it is only 4% of the websites enabling it.

Website Header
www.adcash.com X-XSS-Protection: 1; mode=block
www.badoo.com X-XSS-Protection: 1; mode=block
www.blogger.com X-XSS-Protection: 1; mode=block
www.blogspot.com X-XSS-Protection: 1; mode=block
www.facebook.com X-XSS-Protection: 0
www.feedburner.com X-XSS-Protection: 1; mode=block
www.github.com X-XSS-Protection: 1; mode=block
www.google.de X-XSS-Protection: 1; mode=block
www.live.com X-XSS-Protection: 0
www.meinestadt.de X-XSS-Protection: 1; mode=block
www.openstreetmap.org X-XSS-Protection: 1; mode=block
www.tape.tv X-XSS-Protection: 1; mode=block
www.xing.de X-XSS-Protection: 1; mode=block; report=https://www.xing.com/tools/xss_reporter
www.youtube.de X-XSS-Protection: 1; mode=block; report=https://www.google.com/appserve/security-bugs/log/youtube

Usage of X-Content-Type-Options

Here 15 of 245 websites (6%) enable the option.

Website Header
www.blogger.com X-Content-Type-Options: nosniff
www.blogspot.com X-Content-Type-Options: nosniff
www.deutschepost.de X-Content-Type-Options: NOSNIFF
www.facebook.com X-Content-Type-Options: nosniff
www.feedburner.com X-Content-Type-Options: nosniff
www.github.com X-Content-Type-Options: nosniff
www.linkedin.com X-Content-Type-Options: nosniff
www.live.com X-Content-Type-Options: nosniff
www.meinestadt.de X-Content-Type-Options: nosniff
www.openstreetmap.org X-Content-Type-Options: nosniff
www.spotify.com X-Content-Type-Options: nosniff
www.tape.tv X-Content-Type-Options: nosniff
www.wikihow.com X-Content-Type-Options: nosniff
www.wikipedia.org X-Content-Type-Options: nosniff
www.youtube.de X-Content-Type-Options: nosniff

Usage of Content-Security-Policy

Actually only 1 website in the top 200 Alexa ranked websites uses CSP and this lonely site is github. The problem with CSP obviously being the necessity to have a clear structure for the origin domains of the site elements. And the less advertisments and tracking pixels you have the easier it becomes...

Website Header
www.github.com Content-Security-Policy: default-src *; script-src https://github.global.ssl.fastly.net https://ssl.google-analytics.com https://collector-cdn.github.com; style-src 'self' 'unsafe-inline' 'unsafe-eval' https://github.global.ssl.fastly.net; object-src https://github.global.ssl.fastly.net

Usage of X-Frame-Options

The X-Frame-Options header is currently delivered by 43 of 245 websites (17%).

Website Header
www.adcash.com X-Frame-Options: SAMEORIGIN
www.adf.ly X-Frame-Options: SAMEORIGIN
www.avg.com X-Frame-Options: SAMEORIGIN
www.badoo.com X-Frame-Options: DENY
www.battle.net X-Frame-Options: SAMEORIGIN
www.blogger.com X-Frame-Options: SAMEORIGIN
www.blogspot.com X-Frame-Options: SAMEORIGIN
www.dailymotion.com X-Frame-Options: deny
www.deutschepost.de X-Frame-Options: SAMEORIGIN
www.ebay.de X-Frame-Options: SAMEORIGIN
www.facebook.com X-Frame-Options: DENY
www.feedburner.com X-Frame-Options: SAMEORIGIN
www.github.com X-Frame-Options: deny
www.gmx.de X-Frame-Options: deny
www.gmx.net X-Frame-Options: deny
www.google.de X-Frame-Options: SAMEORIGIN
www.groupon.de X-Frame-Options: SAMEORIGIN
www.imdb.com X-Frame-Options: SAMEORIGIN
www.indeed.com X-Frame-Options: SAMEORIGIN
www.instagram.com X-Frame-Options: SAMEORIGIN
www.java.com X-Frame-Options: SAMEORIGIN
www.linkedin.com X-Frame-Options: SAMEORIGIN
www.live.com X-Frame-Options: deny
www.mail.ru X-Frame-Options: SAMEORIGIN
www.mozilla.org X-Frame-Options: DENY
www.netflix.com X-Frame-Options: SAMEORIGIN
www.openstreetmap.org X-Frame-Options: SAMEORIGIN
www.oracle.com X-Frame-Options: SAMEORIGIN
www.paypal.com X-Frame-Options: SAMEORIGIN
www.pingdom.com X-Frame-Options: SAMEORIGIN
www.skype.com X-Frame-Options: SAMEORIGIN
www.skype.de X-Frame-Options: SAMEORIGIN
www.softpedia.com X-Frame-Options: SAMEORIGIN
www.soundcloud.com X-Frame-Options: SAMEORIGIN
www.sourceforge.net X-Frame-Options: SAMEORIGIN
www.spotify.com X-Frame-Options: SAMEORIGIN
www.stackoverflow.com X-Frame-Options: SAMEORIGIN
www.tape.tv X-Frame-Options: SAMEORIGIN
www.web.de X-Frame-Options: deny
www.wikihow.com X-Frame-Options: SAMEORIGIN
www.wordpress.com X-Frame-Options: SAMEORIGIN
www.yandex.ru X-Frame-Options: DENY
www.youtube.de X-Frame-Options: SAMEORIGIN

Usage of HSTS Strict-Transport-Security

HSTS headers can only be found on a few front pages (8 of 245). Maybe it is visible more on the login pages and is avoided on front pages for performance reasons, maybe not. That would require further analysis. What can be said is only some larger technology leaders are brave enough to use it on the front page:

Website Header
www.blogger.com Strict-Transport-Security: max-age=10893354; includeSubDomains
www.blogspot.com Strict-Transport-Security: max-age=10893354; includeSubDomains
www.facebook.com Strict-Transport-Security: max-age=2592000
www.feedburner.com Strict-Transport-Security: max-age=10893354; includeSubDomains
www.github.com Strict-Transport-Security: max-age=31536000
www.paypal.com Strict-Transport-Security: max-age=14400
www.spotify.com Strict-Transport-Security: max-age=31536000
www.upjers.com Strict-Transport-Security: max-age=47336400

Conclusion

Security headers are not wide-spread on website front pages at least. Most used is the X-Frame-Option header to prevent clickjacking. Next following is X-Content-Type-Options to prevent MIME sniffing. Both of course are easy to implement as they most probably do not change your websites behaviour. I'd expect to see more HSTS on bank and other online payment service websites, but it might well be that the headers appear only on subsequent redirects when logging in, which this scan doesn't do. With CSP being the hardest to implement, as you need to have complete control over all domain usage by application content and partner content you embed, it is no wonder that only Github.com has implemented it. For me it is an indication how clean their web application actually is.

Liferea Bug Tracker Switching to Github

Dear maintainers and contributing end users,

I plan to switch the bug tracker from SourceForge to Github to the end of the month (31.05.2014) to further simplify the workflow of maintaining Liferea. As a benefit at Github I'll maintain milestones with due dates and assigned issues. The Github bug tracker is already in use by some users. Feel free to use it right now.

Nothing Gets Lost!

I won't ignore the old tickets, they will just become invisible. I promise to process all important SF tickets. I believe you will still get mail notifications on state changes. For the maintainers: if you still need to access the tickets I we can find a solution (admin user role...). I know this pains you guys probably the most and don't want to mess up your valuable work more than absolutely necessary.

If you are in any doubt please drop a short mail on the mailing list or just recreate all the tickets at Github: https://github.com/lwindolf/liferea/issues?milestone=2&state=open

The Future

I plan to entirely stop using the Sourceforge tools in favour of Github. Sourceforge is just not very useable. Code formatting looks funny all the time. One needs to edit tickets to change state. Also the commit correlation with tickets in Github is just a killer feature for me.

For the future I also hope to invite more contributions via Github forking and merging. By also switching more code to Python plugins I can imagine some more users crossing the barrier, that coding in C is, and contribute.

Website Technology Changes in March 2014

As in the last months let's look into changes visible at the frontend pages of the biggest websites. This time I compared the changes between February to April.

These last two months saw the usual lot of version upgrades, along with some probably unintended un-hiding of server versions, several sites going to CloudFlare as well as a premiere with IPv6 being available on the first adult movie site.

The detailed results can be found here:

What Changed?

DNS-Prefetching The HTML header based DNS prefetching is expanding once more and for the first time used on adult site: redtube.com
IPv6 An AAAA record was sighted for the first time for xhamster.com. That makes IPv6 available for the first time on a major adult site!
CDN Changes
Version Upgrades
  • dooyoo.de upgrades from PHP 5.3.2-1ubuntu4.15 to recent 4.23
  • adf.ly upgrades from PHP 5.4.21 to 5.5.8
  • duden.de upgrades from PHP 5.3.3-7+squeeze18 to 19
  • duden.de upgrades from PHP 4.4.6 to 5.4.16
  • wikipedia.de upgrades from PHP 5.3.3-7+squeeze9 to 19
  • wikipedia.org upgrades from PHP 5.3.19-1ubuntu3.9+wmf1 to 3.10+wmf1
  • xhamster.com upgrades from PHP 5.3.21 to 5.3.26
  • jquery.com upgrades from nginx 1.4.4 to 1.4.7
  • xhamster.com upgrades from nginx 1.4.4 to 1.4.7
  • qq.com upgrades from squid 3.1.18 to 3.2.1
Hiding Server Version Against the trend in the last month this month three sites have unhidden the previously hidden server details:
  • edarling.de normally not showing any server version displayed "PHP/5.4.4-14+deb7u7" in February.
  • greenpeace.de previously not indicating the Apache version now shows CentOS Apache 2.2.15
  • jamba.de previously hiding the server version in April indicated "Servlet 2.4; JBoss-4.3.0.GA_CP06 (build"

Note: the website links lead to a history page for the different sites were you can see the change details.

Caution!

All the results listed above are based on a simple scanning script. The results present a snapshot of the websites and a single response only. This is of course not necessarily an indicating for what techniques the site uses in daily operations!

Who is using which CDN in 04/2014

Recent CDN usage for top 200 Alexa ranked sites and major German sites. For measurement method read more here...

CDN Sites
Akamai web.mit.edu adobe.com aol.de apple.com ask.com autobild.de avg.com bbc.co.uk bigpoint.com bild.de bing.com buch.de buzzfeed.com chip.de cnet.com cnn.com computerbild.de conduit.com crunchbase.com dailymotion.com dooyoo.de ebay.de edarling.de erento.com facebook.com finanzen.net flickr.com flipkart.com focus.de forbes.com godaddy.com huffingtonpost.com hungryhouse.co.uk ifeng.com imdb.com immonet.de indeed.com jamba.de java.com last.fm lieferheld.de linkedin.com mashable.com microsoft.de mjam.at morgenpost.de mozilla.org msdn.com msn.com mtv.com mytoys.de mywebsearch.com netflix.com n-tv.de otto.de paypal.com pizza.de qq.com reddit.com reference.com rp-online.de rtl.de salesforce.com skype.com skype.de slashdot.org sourceforge.net spiegel.de sport1.DE stepstone.de stern.de stumbleupon.com sueddeutsche.de superantojo.com.mx taobao.com theguardian.com welt.de wetter.com wetteronline.de xing.de zdf.de zedo.com
cachefly arstechnica.com cdnplanet.com
CDNetworks ifeng.com
Cedexis autobild.de bild.de computerbild.de finanzen.net morgenpost.de welt.de
Cloudflare crunchbase.com foodpanda.in foodpanda.pl foodpanda.ru imgur.com pingdom.com statcounter.com
CloudFront web.mit.edu addthis.com amazon.com amazon.de arstechnica.com bannersdontwork.com berlinonline.de cdnplanet.com chefkoch.de crunchbase.com foodarena.ch foodpanda.in foodpanda.ru hungryhouse.co.uk imdb.com instagram.com kicker.de neobux.com nzz.ch onlinepizza.se pizzaportal.pl samsung.com spotify.com stumbleupon.com superantojo.com.mx theguardian.com tivo.com tumblr.com tvinfo.de
EdgeCast web.mit.edu buzzfeed.com dailymotion.com erento.com forbes.com soundcloud.com sueddeutsche.de tumblr.com twitter.com
fastly web.mit.edu github.com samsung.com theguardian.com twitter.com
Level3 go.com groupon.de kicker.de linkedin.com photobucket.com stern.de sueddeutsche.de theguardian.com wetter.com zalando.de
Limelight arstechnica.com arte.tv softpedia.com swissre.com xnxx.com xvideos.com zeit.de
phncdn.com pornhub.com redtube.com tube8.com youporn.com
rncdn1.com thepiratebay.sx tube8.com
WaveCDN upjers.com

Liferea 1.10.9 Released

Today sees another maintenance release for 1.10. This release addresses TinyTinyRSS updating issues. If you are affected please upgrade and give feedback if it helped!

    * Fixes Github #19: non void function should return value
      (reported by kwm81)
    * Fixes SF #1141: Liferea does not update feeds with TinyTinyRSS
      (reported by Dominik Grafenhofer, denk_mal, Fabian Henze)
    * Fixes SF #1150: subscription prop/source: not all fields and
      buttons visible (reported by David Smith)

Download Liferea 1.10.9

https://github.com/lwindolf/liferea/releases/download/v1.10.9/liferea-1.10.9.tar.bz2

Syndicate content