

{"id":48030,"date":"2026-05-14T08:40:19","date_gmt":"2026-05-14T13:40:19","guid":{"rendered":"https:\/\/rud.is\/b\/?p=48030"},"modified":"2026-05-14T08:40:19","modified_gmt":"2026-05-14T13:40:19","slug":"three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/","title":{"rendered":"Three CVEs and the May 2026 Exploit Chain Nobody&#8217;s Taking Seriously"},"content":{"rendered":"<p>May 2026 dropped three critical Linux vulnerabilities on a near-weekly cadence, and the security discourse has mostly treated them as three separate bad days. They&#8217;re not. Together they form a reliable, race-free, forensically quiet kill chain from the public internet to root, and if you&#8217;re running nginx in front of anything that matters, you need to stop and read this.<\/p>\n<p>CVE-2026-42945, dubbed NGINX Rift, landed May 13 courtesy of depthfirst. It&#8217;s a heap buffer overflow in <code>ngx_http_rewrite_module<\/code> that&#8217;s been sitting in every nginx build since 2008. An unauthenticated attacker sends a single crafted HTTP request and overwrites the heap, getting remote code execution in the worker process \u2013 no auth, no prior session, no prerequisites beyond a network path to port 80 or 443. The root cause is a mismatch between two passes over the rewrite directives: the length calculation runs with <code>is_args=0<\/code> (raw byte count) while the copy pass runs with <code>is_args=1<\/code> (URI-escaped), so the write overruns the allocation. The trigger is a configuration pattern that&#8217;s everywhere: a <code>rewrite<\/code> directive with an unnamed PCRE capture (<code>$1<\/code>, <code>$2<\/code>) and a question mark in the replacement string, followed by another <code>rewrite<\/code>, <code>if<\/code>, or <code>set<\/code> in the same block. CVSS 9.2, and it earns it.<\/p>\n<p>CVE-2026-31431, &#8220;Copy Fail,&#8221; came from Theori on April 29. It&#8217;s a logic bug in the <code>authencesn<\/code> cryptographic template that lets an unprivileged local user write 4 controlled bytes into the page cache of any readable file, then pivot to root. The exploit is 732 bytes of Python (no races, no disk writes, no forensic residue \u2013 the page cache corruption means file integrity checks pass because the underlying file on disk was never touched). It works on every distro shipped since 2017. CISA added it to the Known Exploited Vulnerabilities catalog with a May 15 remediation deadline.<\/p>\n<p>Then there&#8217;s CVE-2026-43284 and CVE-2026-43500, &#8220;Dirty Frag,&#8221; disclosed May 7 by Hyunwoo Kim. It&#8217;s a two-bug chain that lands in the same place as Copy Fail \u2013 page-cache-to-root LPE \u2013 but routes around the Copy Fail mitigation entirely. If you blacklisted <code>algif_aead<\/code> thinking you were covered, Dirty Frag gets there through <code>xfrm-ESP<\/code> or <code>rxrpc<\/code> instead. Microsoft&#8217;s already seeing in-the-wild activity: SSH foothold, stage an ELF binary, escalate via <code>su<\/code>. Deterministic. No races. Same bug class, different sink.<\/p>\n<p>Why does the combination matter more than any single bug? Exploit chains are usually academic exercises, published to demonstrate feasibility and then left to rot in a CTF writeup. This isn&#8217;t that. CVE-2026-42945 hands you a foothold from the internet. CVE-2026-31431 or CVE-2026-43284 hands you root once you&#8217;re on the box. Neither step requires races, user interaction, or authentication. Neither leaves obvious forensic traces on disk. Both have working, published proof-of-concept code as of this writing.<\/p>\n<p>The surface area here is genuinely uncomfortable. NGINX is the most-deployed web server on the planet. WordPress \u2013 with scads of massively-deployed plugins recommended NGINX configuration contains the exact vulnerable rewrite pattern (I checked; it&#8217;s right there in the docs) \u2013 powers something north of 40% of the web. That means whitehouse.gov, NASA, the UK Government, the Australian Government, the State of California, and essentially every major US university is potentially in scope. Every federal agency required by the 21st Century IDEA Act to maintain a public web presence. Every municipality running WordPress on a LEMP stack. Every SaaS app behind an NGINX ingress controller. An attacker doesn&#8217;t need a zero-day chain for any of these; they need access to data from a public internet scanner, a grep for vulnerable version strings, and the ability to send one HTTP request.<\/p>\n<p>I shipped a static configuration scanner for the NGINX Rift pattern. Single bash script, no dependencies beyond bash 4+ and grep, runs offline against config files without touching a live nginx process:<\/p>\n<pre><code class=\"language-bash\">git clone https:\/\/git.sr.ht\/~hrbrmstr\/cve-2026-42945-scanner\ncd cve-2026-42945-scanner\n.\/scan-nginx-rift.sh \/etc\/nginx\n<\/code><\/pre>\n<p>Run it on every box running nginx. Add <code>--json<\/code> in CI. Point it at ingress controller configmaps. The output tells you the file, the line number, the vulnerable directive, and which following directive creates the exploitability condition:<\/p>\n<pre><code class=\"language-text\">[VULN] sites-enabled\/wordpress.conf:8 \u2013 rewrite ^\/([^\/]+?)-sitemap([0-9]+)?.xml$\n          followed by \"if\" at line 12\n<\/code><\/pre>\n<p>If you find a hit, you&#8217;ve got two options in order of preference:<\/p>\n<ol>\n<li>Upgrade nginx to 1.30.1 (stable) or 1.31.0 (mainline).<\/li>\n<li>Replace unnamed captures with named captures in every affected <code>rewrite<\/code>:<\/li>\n<\/ol>\n<pre><code class=\"language-nginx\"># Before (vulnerable)\nrewrite ^\/([^\/]+?)-sitemap([0-9]+)?.xml$ \/index.php?sitemap=$1&amp;sitemap_n=$2 last;\n\n# After (safe)\nrewrite ^\/(?&lt;term&gt;[^\/]+?)-sitemap(?&lt;num&gt;[0-9]+)?.xml$ \/index.php?sitemap=$term&amp;sitemap_n=$num last;\n<\/code><\/pre>\n<p>For the kernel side, check your distro&#8217;s patch status now and don&#8217;t trust &#8220;we&#8217;ll get to it.&#8221; If you can&#8217;t patch immediately, blacklisting <code>algif_aead<\/code> blocks Copy Fail but does nothing for Dirty Frag. For Dirty Frag, unload <code>xfrm_algo.ko<\/code> and <code>rxrpc.ko<\/code> if your workload doesn&#8217;t need them, and make sure AppArmor or SELinux policy is blocking unprivileged user namespaces.<\/p>\n<p>Three critical Linux CVEs in three weeks, all with published exploits, all in code that&#8217;s been shipping for years. The gap between disclosure and working exploit is now measured in hours, not months. The scanner above closes one piece of that gap for the nginx side. The rest depends on whether you check your configs today or wait until something in your logs looks wrong \u2013 at which point the forensic-residue-free LPE means &#8220;looking wrong&#8221; may be all you ever see.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>May 2026 dropped three critical Linux vulnerabilities on a near-weekly cadence, and the security discourse has mostly treated them as three separate bad days. They&#8217;re not. Together they form a reliable, race-free, forensically quiet kill chain from the public internet to root, and if you&#8217;re running nginx in front of anything that matters, you need [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"federated","footnotes":""},"categories":[681,3,26],"tags":[],"class_list":["post-48030","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-information-security","category-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three CVEs and the May 2026 Exploit Chain Nobody&#039;s Taking Seriously - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three CVEs and the May 2026 Exploit Chain Nobody&#039;s Taking Seriously - rud.is\" \/>\n<meta property=\"og:description\" content=\"May 2026 dropped three critical Linux vulnerabilities on a near-weekly cadence, and the security discourse has mostly treated them as three separate bad days. They&#8217;re not. Together they form a reliable, race-free, forensically quiet kill chain from the public internet to root, and if you&#8217;re running nginx in front of anything that matters, you need [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-14T13:40:19+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2026\\\/05\\\/14\\\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2026\\\/05\\\/14\\\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Three CVEs and the May 2026 Exploit Chain Nobody&#8217;s Taking Seriously\",\"datePublished\":\"2026-05-14T13:40:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2026\\\/05\\\/14\\\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\\\/\"},\"wordCount\":829,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"articleSection\":[\"Cybersecurity\",\"Information Security\",\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2026\\\/05\\\/14\\\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2026\\\/05\\\/14\\\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2026\\\/05\\\/14\\\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\\\/\",\"name\":\"Three CVEs and the May 2026 Exploit Chain Nobody's Taking Seriously - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2026-05-14T13:40:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2026\\\/05\\\/14\\\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2026\\\/05\\\/14\\\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2026\\\/05\\\/14\\\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three CVEs and the May 2026 Exploit Chain Nobody&#8217;s Taking Seriously\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three CVEs and the May 2026 Exploit Chain Nobody's Taking Seriously - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/","og_locale":"en_US","og_type":"article","og_title":"Three CVEs and the May 2026 Exploit Chain Nobody's Taking Seriously - rud.is","og_description":"May 2026 dropped three critical Linux vulnerabilities on a near-weekly cadence, and the security discourse has mostly treated them as three separate bad days. They&#8217;re not. Together they form a reliable, race-free, forensically quiet kill chain from the public internet to root, and if you&#8217;re running nginx in front of anything that matters, you need [&hellip;]","og_url":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/","og_site_name":"rud.is","article_published_time":"2026-05-14T13:40:19+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Three CVEs and the May 2026 Exploit Chain Nobody&#8217;s Taking Seriously","datePublished":"2026-05-14T13:40:19+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/"},"wordCount":829,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"articleSection":["Cybersecurity","Information Security","Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/","url":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/","name":"Three CVEs and the May 2026 Exploit Chain Nobody's Taking Seriously - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2026-05-14T13:40:19+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2026\/05\/14\/three-cves-and-the-may-2026-exploit-chain-nobodys-taking-seriously\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Three CVEs and the May 2026 Exploit Chain Nobody&#8217;s Taking Seriously"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-cuG","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":968,"url":"https:\/\/rud.is\/b\/2012\/04\/28\/slaying-the-beast-in-nginx\/","url_meta":{"origin":48030,"position":0},"title":"Slaying the BEAST in nginx","author":"hrbrmstr","date":"2012-04-28","format":false,"excerpt":"Just a quick post as I noticed that my nginx configuration was vulnerable to the BEAST attack thanks to the #spiffy SSL Certificate Tester from Qualys (I scored an \"A\", btw :-). The nginx docs show how to do this, now, and it's pretty simple (very similar to the Apache\u2026","rel":"","context":"In &quot;Certificates&quot;","block_context":{"text":"Certificates","link":"https:\/\/rud.is\/b\/category\/certificates\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":13640,"url":"https:\/\/rud.is\/b\/2022\/11\/11\/honk-if-you-like-the-fediverse\/","url_meta":{"origin":48030,"position":1},"title":"Honk If You Like The Fediverse!","author":"hrbrmstr","date":"2022-11-11","format":false,"excerpt":"This is a re-post from today's newsletter. I generally avoid doing this but the content here is def more \"bloggy\" than \"newslettery\". You can now receive these blog posts in your activity stream. Just follow @hrbrmstr@rud.is and the new posts from here will slide right into your timeline. So, you've\u2026","rel":"","context":"In &quot;fediverse&quot;","block_context":{"text":"fediverse","link":"https:\/\/rud.is\/b\/category\/fediverse\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12056,"url":"https:\/\/rud.is\/b\/2019\/03\/04\/ip-user-agent-and-referrer-tracking-disabled-on-cinc-rud-is-and-git-rud-is\/","url_meta":{"origin":48030,"position":2},"title":"IP, User Agent, and Referrer Tracking Disabled on cinc.rud.is and git.rud.is","author":"hrbrmstr","date":"2019-03-04","format":false,"excerpt":"Not flagging this with an \"R\" tag since I don't want to spam R-bloggers but I mentioned here that I'd be disabling logging on https:\/\/cinc.rud.is and https:\/\/git.rud.is and I wanted to follow up on that with an addendum that I've opted to disable user\/system tracking in the access logs of\u2026","rel":"","context":"In &quot;Site News&quot;","block_context":{"text":"Site News","link":"https:\/\/rud.is\/b\/category\/site-news\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":400,"url":"https:\/\/rud.is\/b\/2011\/03\/24\/repairing-strict-transport-security-in-chrome-on-os-x\/","url_meta":{"origin":48030,"position":3},"title":"&#8220;Repairing&#8221; Strict Transport Security in Chrome on OS X","author":"hrbrmstr","date":"2011-03-24","format":false,"excerpt":"One of my subdomains is for mail and I was using an easy DNS hack to point it to my hosted Gmail setup (just create a CNAME pointing to ghs.google.com). This stopped working for some folks this week and I've had no time to debug exactly why so I decided\u2026","rel":"","context":"In &quot;Certificates&quot;","block_context":{"text":"Certificates","link":"https:\/\/rud.is\/b\/category\/certificates\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12016,"url":"https:\/\/rud.is\/b\/2019\/03\/03\/cran-mirror-security\/","url_meta":{"origin":48030,"position":4},"title":"CRAN Mirror &#8220;Security&#8221;","author":"hrbrmstr","date":"2019-03-03","format":false,"excerpt":"In the \"Changes on CRAN\" section of the latest version of the The R Journal (Vol. 10\/2, December 2018) had this short blurb entitled \"CRAN mirror security\": Currently, there are 100 official CRAN mirrors, 68 of which provide both secure downloads via \u2018https\u2019 and use secure mirroring from the CRAN\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12004,"url":"https:\/\/rud.is\/b\/2019\/02\/28\/drat-all-the-%f0%9f%93%a6-enabling-easier-package-discovery-and-installation-with-your-own-cran-like-repo-for-your-packages\/","url_meta":{"origin":48030,"position":5},"title":"drat All The ?! : Enabling Easier Package Discovery and Installation with Your Own CRAN-like Repo for Your Packages","author":"hrbrmstr","date":"2019-02-28","format":false,"excerpt":"I've got a work-in-progress drat-ified CRAN-like repo for (eventually) all my packages over at CINC? (\"CINC is not CRAN\" and it also sounds like \"sync\"). This is in parallel with a co-location\/migration of all my packages to SourceHut (just waiting for the sr.ht alpha API to be baked) and a\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/48030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=48030"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/48030\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=48030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=48030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=48030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}