From owner-freebsd-hackers@freebsd.org Sat Jul 6 23:14:51 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BA1E915D5C62 for ; Sat, 6 Jul 2019 23:14:51 +0000 (UTC) (envelope-from me@yadavpratyush.com) Received: from relay2-d.mail.gandi.net (relay2-d.mail.gandi.net [217.70.183.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B03E685E1A for ; Sat, 6 Jul 2019 23:14:49 +0000 (UTC) (envelope-from me@yadavpratyush.com) X-Originating-IP: 209.85.208.45 Received: from mail-ed1-f45.google.com (mail-ed1-f45.google.com [209.85.208.45]) (Authenticated sender: me@yadavpratyush.com) by relay2-d.mail.gandi.net (Postfix) with ESMTPSA id 4910840006 for ; Sat, 6 Jul 2019 23:14:16 +0000 (UTC) Received: by mail-ed1-f45.google.com with SMTP id w13so11080603eds.4 for ; Sat, 06 Jul 2019 16:14:16 -0700 (PDT) X-Gm-Message-State: APjAAAVO4+aqY6bQV0XhkVUnMsfBFwaret4w8VE/pdJHetEM7fIviTHx 46sK17Vr6b5KoxifQP3ZyGw+aOa85A8foBafXog= X-Google-Smtp-Source: APXvYqyopkkhnnUDCqjbG4/mpa+0asC7wsSYKPmx4/zN2MmHMmrWL2atmXmgEMkWQYaiRXI6ukcUmOiAPqw4BZlWyKk= X-Received: by 2002:a50:b13b:: with SMTP id k56mr12377174edd.192.1562454856713; Sat, 06 Jul 2019 16:14:16 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Pratyush Yadav Date: Sun, 7 Jul 2019 04:43:40 +0530 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: Secure urls in kernel? To: Unidef Cc: Hackers freeBSD Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: B03E685E1A X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of me@yadavpratyush.com designates 217.70.183.194 as permitted sender) smtp.mailfrom=me@yadavpratyush.com X-Spamd-Result: default: False [-2.81 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_XOIP(0.00)[]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:217.70.183.192/28]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; DMARC_NA(0.00)[yadavpratyush.com]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[spool.mail.gandi.net,fb.mail.gandi.net]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-0.56)[-0.564,0]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; RCVD_TLS_LAST(0.00)[]; RCVD_IN_DNSWL_LOW(-0.10)[194.183.70.217.list.dnswl.org : 127.0.5.1]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:29169, ipnet:217.70.176.0/20, country:FR]; MIME_TRACE(0.00)[0:+]; IP_SCORE(-0.84)[ip: (-2.15), ipnet: 217.70.176.0/20(-1.12), asn: 29169(-0.91), country: FR(-0.01)]; FROM_EQ_ENVFROM(0.00)[] X-Mailman-Approved-At: Sun, 07 Jul 2019 00:16:21 +0000 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 06 Jul 2019 23:14:51 -0000 On Sat, 6 Jul 2019 at 10:57, Unidef wrote: > > I was thinking about embedding encrypted JavaScript in a :a h ref ; tag and thought about an injection hack, so is it hard to implement some kind of pointer function exception handling in the kernel? I have to read the FreeBSD kernel book :( Does this make any sense to any of you folks? Because all I read is gibberish. This person's last post was similarly full of this kind of gibberish. > Sent from my iPhone > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" -- Regards, Pratyush Yadav