frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Turn any browser into your Mac's terminal

https://vibetunnel.sh
1•crcastle•42s ago•0 comments

ICE leaves cars abandoned, lawn mowers running when it arrests workers

https://www.latimes.com/california/story/2025-07-08/ice-abandonded-items
1•KnuthIsGod•2m ago•0 comments

Submatrix Cloud Phone × Reddit Communities

1•yt1314•3m ago•0 comments

Ask HN: Do you think a new alternative to MCP would be useful?

1•empire23•4m ago•0 comments

Co-founder exiting after pivot – what's a fair exit package?

1•throwaway-xx•8m ago•0 comments

The Paradox of India

https://substack.com/inbox/post/167669493
1•Michelangelo11•12m ago•0 comments

Replit Collaborates with Microsoft to Bring Vibe Coding to Enterprise Customers

https://replit.com/news/microsoft-partnership
1•denysvitali•12m ago•0 comments

Free Online Text-to-Speech Tool

https://pronounceonline.com/text-to-speech/
1•wsljhint•22m ago•0 comments

Free SVG Editor – BruhGrow Tools

https://bruhgrow.com/tools/svg-to-code
2•mdanassaif•28m ago•0 comments

Jeff Bezos-backed satellite costing him $100M lost in space

https://www.the-independent.com/tech/jeff-bezos-satellite-lost-space-b2780984.html
2•thunderbong•34m ago•0 comments

Managing by Coincidence

https://jamesjboyer.substack.com/p/managing-by-coincidence
1•gpi•34m ago•0 comments

Helm local code execution via a malicious chart – CVE-2025-53547

https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
20•irke882•39m ago•0 comments

Cloudflare to block AI crawlers by default with new Pay Per Crawl initiative

https://searchengineland.com/cloudflare-to-block-ai-crawlers-by-default-with-new-pay-per-crawl-initiative-457708
1•biscuit1v9•39m ago•1 comments

Show HN: Remove water from speaker using specific frequency

https://speakercleaner.org/
1•artiomyak•40m ago•0 comments

Vercel Accquired Nuxt

https://vercel.com/blog/nuxtlabs-joins-vercel
1•carlual•47m ago•1 comments

Lump of labour fallacy

https://en.wikipedia.org/wiki/Lump_of_labour_fallacy
1•mfiguiere•54m ago•0 comments

The Sequoia Investor Whose Anti-Mamdani Posts Set Off a Silicon Valley Storm

https://www.wsj.com/tech/the-sequoia-investor-whose-anti-mamdani-posts-set-off-a-silicon-valley-storm-56965cdf
2•KnuthIsGod•55m ago•1 comments

The Dark Side of Apple Development

https://www.magiclasso.co/insights/apple-development/
1•ustad•56m ago•0 comments

Psilocybin treatment extends cellular lifespan, improves survival of aged mice

https://www.nature.com/articles/s41514-025-00244-x
3•XzetaU8•1h ago•1 comments

Full event page with photo sharing

https://pixdrop.com
1•yevo_a•1h ago•2 comments

Proving P ≠ NP via Categorical and Graph-Theoretic 3-SAT

https://www.texstr.org/a/naddr1qvzqqqr4gupzqwe6gtf5eu9pgqk334fke8f2ct43ccqe4y2nhetssnypvhge9ce9qqxnzde4xgcrxdfj8qmnvwfc69lg5m
1•vmstabile•1h ago•1 comments

Advancing Protection in Chrome on Android

https://security.googleblog.com/2025/07/advancing-protection-in-chrome-on.html
2•mfrw•1h ago•0 comments

TimescaleDB helped us scale analytics and reporting

https://blog.cloudflare.com/timescaledb-art/
1•arunmu•1h ago•1 comments

Microsoft Music Producer (1996)

https://archive.org/details/microsoft-music-producer_202210
2•CharlesW•1h ago•0 comments

How to stop a bear in big city: Japan issues shoot-to-kill guide

https://www.thetimes.com/world/asia/article/japan-offers-citizens-instructions-on-how-to-kill-a-bear-dpml5msf3
1•petethomas•1h ago•0 comments

Ask HN: What Problem Would You Solve with Unlimited Resources?

5•hedayet•1h ago•10 comments

Nginx-micro:Ultra-minimal, statically-linked, multi-architecture Nginx container

https://github.com/johnnyjoy/nginx-micro
1•thunderbong•1h ago•0 comments

Enlightenment as the Great Filter

https://www.aru.ai/essays/great-filter/
3•aru•1h ago•0 comments

TOML v0.9

https://epage.github.io/blog/2025/07/toml-09/
2•Bogdanp•1h ago•0 comments

Pattern-wishcast: enum pattern types in 2025 rust

https://lunnova.dev/articles/pattern-wishcast/
1•nalllar•1h ago•0 comments
Open in hackernews

eBPF Mystery: When is IPv4 not IPv4? When it's pretending to be IPv6

https://blog.gripdev.xyz/2025/05/06/ebpf-mystery-when-is-ipv4-not-ipv4-when-its-ipv6/
95•tanelpoder•2mo ago

Comments

degamad•2mo ago
I think of that as the opposite - an IPv6 socket pretending to be IPv4 in order to route to an IPv4 endpoint.
ignoramous•2mo ago
Depends on the vantage point: For a firewall that's ip4 hiding in ip6. For a router, that's ip6 accomodating ip4.
Dagger2•1mo ago
::ffff:0:0/96 is for representing v4 addresses in v6 APIs. You shouldn't even see it on the wire at all, but if you do it's just a regular v6 bogon range and not anything to do with v4, so it doesn't get or need any special handling in firewalls or routers.
smitty1e•2mo ago
In a similar fashion, I once saw a python script that called out to a one-page C program that read a .csv dump (probably from SQLServer) and blew away the upper byte of each character, demoting it to ASCII.

Once I understood what was afoot, I was sad that someone had worked so hard when python's open() call supports an 'encoding' argument for just these occasions.

bouke•2mo ago
Reminds me of a time where someone stored the md5 hash of a password as a string by throwing away all non-ascii bytes; so roughly half the bytes.
o11c•2mo ago
I've seen something similar, but it depended on whether plain `char` is signed or unsigned, which is highly platform-dependent.
spiritplumber•2mo ago
that's the first thing i ever uploaded anywhere! fixtxt.exe on simtel.net
imoverclocked•2mo ago
If you think that's wild, just wait until you learn about 6to4 [1] (not to be confused with 6over4 [2] ...)

TL;DR: Given a globally unique IPv4 address, you can create automatic tunneling IPv6 networks with the IPv4 address embedded into the IPv6 address space.

[1] https://en.wikipedia.org/wiki/6to4

[2] https://en.wikipedia.org/wiki/6over4

Sesse__•2mo ago
And for a short while, it was the most common use of IPv6 on the public Internet! Now largely dead and gone.
zzq1015•2mo ago
It's a mess when you learn there are also 6in4, 6rd and teredo...
jeroenhd•2mo ago
Out of all of those, 6rd is actually a success, though 6rd is built on top of 6to4. Funnily enough, the first ISP to apply 6rd has actually inverted its network and is now using 4rd to provide IPv4 to some of its customers.

Not just that, but also 4in6 (IPv4 in modern networks) and 4over6 (an extension to DS-Lite), and don't forget 6in4 being called SIT in an early draft, followed by SIIT being used in another protocol with a similar purpose (though that's more of a "Linux kept the old name around while everyone else moved on" problem).

Like most actually-used transition mechanisms, 6rd the result of someone inventing a transition strategy for a very specific use case, a company with that use case actually using that solution, and followed by standardization for good measure.

6to4 has been disabled for a few in Windows and has been disabled by default in Windows 11 since release, so in practice you probably won't see it outside of legacy networks and the routing systems designed to support 6rd or legacy networks.

Teredo was a weird Microsoft thing (like so many other network protocols) that could've replaced stupid shit like STUN and TURN had it been used. I'm pretty sure only Microsoft ever bothered to host Teredo servers to the mainstream. It would've been nice to live in a world where STUN and TURN worked for any protocol without having to set up your own servers rather than just supporting UDP and the server of an ad company (like we use today).

6in4 was a naive attempt at making the transition to IPv6 possible in the very early days (1996). It's the response to all of the "what if we just added a bunch of bits to IPv4" suggestion, and it turns out that nobody who says that actually seriously cares about supporting IPv6.

Dagger2•1mo ago
6in4 is just a basic "put the v6 packet directly into the payload of a v4 packet" tunnelling approach. It's a sensible way of tunnelling one protocol over another (and it's the same thing as 4in6, just the other way around).

HE's tunnels are 6in4, and 6to4 and 6rd are automatically-configured 6in4 tunnels.

gitroom•2mo ago
pretty cool seeing all the stuff people do to make networks talk, honestly makes me wonder - you think stuff like this sticks around because of habit or just taking shortcuts sometimes
dilfish•2mo ago
I learnt this when using net.ListenTCP in Go, if you use lsof to show the network type, it would be IPv6. But it could also handle IPv4 requests.
IcePic•2mo ago
I think OpenBSD (and other OSes) that do not allow v4 on v6 sockets might be on to something. It was felt convenient for application programmers to only have to listen to one socket for two protocols, but then code after needs to make very sure they know how to handle both families in the correct way for logging and so on, and now much later on it confuses someone that has to dig very deep into why the v4-box talks v4 without using v4.

Could be an indication that in the long run, just forcing applications that need both protocols to have separation so you are sure of what they are doing was the correct choice.

nsteel•2mo ago
In my personal experience, OpenBSD going against the RFC and being different to everyone else has made more headaches for me.
eqvinox•2mo ago
> OpenBSD (and other OSes)

are there actually other OSes doing this?

(- by default?)

zzq1015•2mo ago
For Linux, there's a kernel setting for that.

Just run

  sysctl -w net.ipv6.bindv6only=1
so IPv6 will not include IPv4-mapped addresses.

https://www.kernel.org/doc/Documentation/networking/ip-sysct...

majke•2mo ago
usually better to set IPV6_V6ONLY in the application itself.
eqvinox•2mo ago
This affects -to my best knowledge- only bind()ing, not outgoing connect()ing. As the name implies, really.

(I should try this, not entirely sure tbh.)

It won't help you though if the resolver library gives you a ::ffff:ma.p.p.ed address (yes they can do that), then you just fail to connect…

aaronmdjones•2mo ago
I did try this. connect(2) with an IPv4-mapped IPv6 address on an AF_INET6 socket with IPV6_V6ONLY set on it fails.
eqvinox•2mo ago
Very good to know, Thanks for trying!
jcalvinowens•2mo ago
It's important to emphasize it only changes the default behavior: unprivileged programs can still use setsockopt(..., IPPROTO_IPV6, IPV6_V6ONLY, ...) to override it. That's not a terribly uncommon thing to do, since different distros have historically used different defaults for the sysctl: you'll have to handle it either way.
Almondsetat•2mo ago
>I thought I must have this wrong, surely you can’t just smash an ipv4 address in ipv6 field and magic happens?! Nope, didn’t have it wrong, that’s what happens. Linux supports this, and will go on to route the request as IPv4.

I mean... it's literally one of the officially defined unicast IPv6 address types. If you ever read the Wikipedia page to learn about what link-local, global unicast, etc. addresses are you surely would have seen it.

mfro•2mo ago
Not everyone spends their days digging through networking specifications. I for one earned CCENT and CCNA certifications was entirely unaware of this mechanism.
Almondsetat•2mo ago
What a bad faith response.

If you are searching for information about IPv6 (as the author of the post was doing for their endeavor) the Wikipedia page will be among the first things you will look at. And if the Wikipedia page clearly states this information then not only is it reasonable to expect someone to find it, but it's very far from "digging through specification"

mfro•2mo ago
...the author of the post linked a wikipedia article about the mechanism in their article. That is how they found out about it. What point are you even trying to make?
lotharcable•2mo ago
If you are going to do weird shoot-self-foot things with writing custom EBF scripts to do ill advised network traffic manipulations things then it is probably a good idea to pay attention to RFCs.

I mean I have a small book of notes I built up based on various network RFCs and I am don't even have a CCENT and CCNA certifications.

This sort of thing isn't unreasonable.

Of course this isn't a dunk on the author of the article (except the part about doing weird DNS games, which sounds like a nightmare for whoever needs to figure out what he did months or years from now). Everybody has run into situations were they think they know how something works and it turns out they are wrong and get a nasty surprise from it.

arccy•2mo ago
maybe it just means those a pretty worthless certs focused on training you to shill for cisco instead of teaching you actually important network concepts...
mfro•2mo ago
No, it means I didn't spend any time on a random specification that will rarely be seen in a production environment. I feel I gained a lot of networking knowledge.
Sesse__•1mo ago
Not sure if you can call it “rarely”; it is very common in application programming. But it is never sent over the wire (unless there is some very buggy IP stack somewhere), which is probably why you did not encounter it in entry-level router/switch certifications.
brewmarche•2mo ago
You need to be a bit careful with terminology, IPv4-compatible and IPv4-mapped are different, i.e. ::/96 vs. ::ffff:0:0/96.

The former (compatible) are not in use anymore, they were specified in an old tunnelling RFC. The latter (mapped) are used for sockets that bind to both IPv4 and IPv6.

There are even more ways to include IPv4 addresses in IPv6 ones (NAT64, 6to4, ...)

nikanj•1mo ago
Still waiting for that bug that was solved by using ipv6, not caused by ipv6
Sesse__•1mo ago
Any bug whatsoever involving NAT traversal?