frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Empusa – Visual debugger to catch and resume AI agent retry loops

https://github.com/justin55afdfdsf5ds45f4ds5f45ds4/EmpusaAI
1•justinlord•2m ago•0 comments

Show HN: Bitcoin wallet on NXP SE050 secure element, Tor-only open source

https://github.com/0xdeadbeefnetwork/sigil-web
2•sickthecat•4m ago•0 comments

White House Explores Opening Antitrust Probe on Homebuilders

https://www.bloomberg.com/news/articles/2026-02-06/white-house-explores-opening-antitrust-probe-i...
1•petethomas•4m ago•0 comments

Show HN: MindDraft – AI task app with smart actions and auto expense tracking

https://minddraft.ai
2•imthepk•9m ago•0 comments

How do you estimate AI app development costs accurately?

1•insights123•10m ago•0 comments

Going Through Snowden Documents, Part 5

https://libroot.org/posts/going-through-snowden-documents-part-5/
1•goto1•11m ago•0 comments

Show HN: MCP Server for TradeStation

https://github.com/theelderwand/tradestation-mcp
1•theelderwand•13m ago•0 comments

Canada unveils auto industry plan in latest pivot away from US

https://www.bbc.com/news/articles/cvgd2j80klmo
2•breve•14m ago•0 comments

The essential Reinhold Niebuhr: selected essays and addresses

https://archive.org/details/essentialreinhol0000nieb
1•baxtr•17m ago•0 comments

Rentahuman.ai Turns Humans into On-Demand Labor for AI Agents

https://www.forbes.com/sites/ronschmelzer/2026/02/05/when-ai-agents-start-hiring-humans-rentahuma...
1•tempodox•19m ago•0 comments

StovexGlobal – Compliance Gaps to Note

1•ReviewShield•22m ago•1 comments

Show HN: Afelyon – Turns Jira tickets into production-ready PRs (multi-repo)

https://afelyon.com/
1•AbduNebu•23m ago•0 comments

Trump says America should move on from Epstein – it may not be that easy

https://www.bbc.com/news/articles/cy4gj71z0m0o
5•tempodox•23m ago•1 comments

Tiny Clippy – A native Office Assistant built in Rust and egui

https://github.com/salva-imm/tiny-clippy
1•salvadorda656•28m ago•0 comments

LegalArgumentException: From Courtrooms to Clojure – Sen [video]

https://www.youtube.com/watch?v=cmMQbsOTX-o
1•adityaathalye•31m ago•0 comments

US moves to deport 5-year-old detained in Minnesota

https://www.reuters.com/legal/government/us-moves-deport-5-year-old-detained-minnesota-2026-02-06/
5•petethomas•34m ago•2 comments

If you lose your passport in Austria, head for McDonald's Golden Arches

https://www.cbsnews.com/news/us-embassy-mcdonalds-restaurants-austria-hotline-americans-consular-...
1•thunderbong•38m ago•0 comments

Show HN: Mermaid Formatter – CLI and library to auto-format Mermaid diagrams

https://github.com/chenyanchen/mermaid-formatter
1•astm•54m ago•0 comments

RFCs vs. READMEs: The Evolution of Protocols

https://h3manth.com/scribe/rfcs-vs-readmes/
2•init0•1h ago•1 comments

Kanchipuram Saris and Thinking Machines

https://altermag.com/articles/kanchipuram-saris-and-thinking-machines
1•trojanalert•1h ago•0 comments

Chinese chemical supplier causes global baby formula recall

https://www.reuters.com/business/healthcare-pharmaceuticals/nestle-widens-french-infant-formula-r...
2•fkdk•1h ago•0 comments

I've used AI to write 100% of my code for a year as an engineer

https://old.reddit.com/r/ClaudeCode/comments/1qxvobt/ive_used_ai_to_write_100_of_my_code_for_1_ye...
2•ukuina•1h ago•1 comments

Looking for 4 Autistic Co-Founders for AI Startup (Equity-Based)

1•au-ai-aisl•1h ago•1 comments

AI-native capabilities, a new API Catalog, and updated plans and pricing

https://blog.postman.com/new-capabilities-march-2026/
1•thunderbong•1h ago•0 comments

What changed in tech from 2010 to 2020?

https://www.tedsanders.com/what-changed-in-tech-from-2010-to-2020/
3•endorphine•1h ago•0 comments

From Human Ergonomics to Agent Ergonomics

https://wesmckinney.com/blog/agent-ergonomics/
1•Anon84•1h ago•0 comments

Advanced Inertial Reference Sphere

https://en.wikipedia.org/wiki/Advanced_Inertial_Reference_Sphere
1•cyanf•1h ago•0 comments

Toyota Developing a Console-Grade, Open-Source Game Engine with Flutter and Dart

https://www.phoronix.com/news/Fluorite-Toyota-Game-Engine
2•computer23•1h ago•0 comments

Typing for Love or Money: The Hidden Labor Behind Modern Literary Masterpieces

https://publicdomainreview.org/essay/typing-for-love-or-money/
1•prismatic•1h ago•0 comments

Show HN: A longitudinal health record built from fragmented medical data

https://myaether.live
1•takmak007•1h ago•0 comments
Open in hackernews

Tunnl.gg

https://tunnl.gg
258•klipitkas•2mo ago

Comments

klipitkas•2mo ago
Built another localhost tunneling tool because I kept forgetting my ngrok auth token.

What it does:

- Expose localhost to the internet (HTTP/TCP/WebSockets) - Zero signup – just works immediately - Free

Nothing groundbreaking, just scratching my own itch for a no-friction tunnel service. Written in Go.

Link: https://tunnl.gg

Happy to answer questions or hear how you'd improve it.

koolala•2mo ago
Since it uses websockets you could host a website from inside a website? How will you handle pricing for this to keep the service running?
klipitkas•2mo ago
There is a maximum time limit for connections right now which is 24hr or 30min of inactivity.
koolala•2mo ago
Could a cacheing service let static sites be cached when offline? I'm not sure if caching sub-domains like this would work but if its a tiny fee to cache maybe that could be a paid feature if your designing those. Like $1 per month could give you a static domain and XX monthly cache updates? As opposed to uploading somewhere like Github Codespaces or a Cloud-Flare service.

Direct real-time connections could be a path like nl.gg/# or a private key that someone could change. Some way to have a public site thats hosted globally for 'nearly free' while also being able to locally host a private url to the dev version for sharing temporarily while your connected. Maybe even a totally different domain.

canopi•2mo ago
That's really cool. I guess this is an alternative to ngrok (which I like but hate due to having to sign in).
klipitkas•2mo ago
Yes, its free to use and does not require any clients (but you need to have ssh client installed)
keepamovin•2mo ago
Not many people know that you can use cloudflare tunnels without signing up.
frizlab•2mo ago
I sure did not! How would that work? Manually pointing the domain as a CNAME to the tunnel ID? But how would one get that ID without signing up?
keepamovin•2mo ago
I have a demo with working GitHub runner workflow code here: https://github.com/BrowserBox/ariadne

Specifically: https://github.com/BrowserBox/ariadne/blob/f07e3b0d445f5d4a8...

kilobaud•2mo ago
Hey if you are interested in re-using any of this GitHub Action, feel free to: https://github.com/LocalXpose/localxpose-action
keepamovin•2mo ago
Thank you bud, was not aware of local expose. There’s a bunch of these tunneling services out there, what makes yours uniquely cool?
kilobaud•2mo ago
Probably not an exciting answer but my work focused on stability and performance. There are indeed a lot of cool alternatives. I think Localxpose is for businesses who aren't interested in self-hosting and just need a service that will reliably handle production traffic. I don't know if that's unique (or cool, lol)
keepamovin•1mo ago
Alrighty, well I might through it into the BrowserBox mix. We are currently using a variety of tunnels for punching through network layers and providing networking flexibility.
hugoromano•2mo ago
Love the approach, simplicity and concept. SPA works fine if entry point is / if /terms /privacy greated with 404.
klipitkas•2mo ago
Hey, thanks for the comment. I am having a look with my own apps and it seems to work with pages and nextjs middleware as well.
rany_•2mo ago
This is a great idea but I'm a bit concerned about your bandwidth costs and illegal/malicious content being hosted used under your domain.

For the second point, you might want to implement some kind of browser warning similar to what Ngrok does.

klipitkas•2mo ago
Thats a fair point, there are some protections in place for abuse already. I will have a look at what ngrok does for browser warnings. Thanks a lot for the suggestions.
gnfargbl•2mo ago
Be aware of threat actors, too: you're giving them an easy data exfil route without the hassle and risk of them having to set up their own infrastructure.

Back in the day you could have stood up something like this and worried about abuse later. Unfortunately, now, a decent proportion early users of services like this do tend to be those looking to misuse it.

skrebbel•2mo ago
What's a "data exfil route"?
lionkor•2mo ago
I'm not who you asked, but essentially, when you write malware that infects someone's PC, that in itself doesn't really help you much. You usually want to get out passwords and other data that you might have stolen.

This is where an exfil (exfiltration) route is needed. You could just send the data to a server you own, but you have to make sure that there are fallbacks once that one gets taken down. You also need to ensure that your exfiltration won't be noticed by a firewall and blocked.

Hosting a server locally, easily, on the infected PC, that can expose data under a specific address is (to my understanding) the holy grail of exfiltration; you just connect to it and it gives you the data, instead of having to worry much about hosting your own infrastructure.

ale42•2mo ago
> Hosting a server locally, easily, on the infected PC, that can expose data under a specific address is (to my understanding) the holy grail of exfiltration; you just connect to it and it gives you the data, instead of having to worry much about hosting your own infrastructure.

A permanent SSH connection is not exactly discreet, though...

skrebbel•2mo ago
Thanks!

Though the public address is going to be random here so how will the hacker figure out which tunnl.gg subdomain to gobble up?

rany_•2mo ago
I've seen lots of weird tricks malware authors use, people are creative. My favorite is that they'd load up a text file with a modified base64 table from Dropbox which points to the URL to exfiltrate to. When you report it to Dropbox, they typically ignore the report because it just seems like random nonsense instead of being actually malicious.
gnfargbl•2mo ago
That's actually a fair defence against this kind of abuse. If the attacker has to get some information (the tunnel ID) out of the victim's machine before they can abuse this service, then it is less useful to them because getting the tunnel ID out is about as hard as just getting the actual data out.

However, if "No signup required for random subdomains" implies that stable subdomains can be obtained with a signup, then the bad guys are just going to sign up.

rishikeshs•2mo ago
How are you able to host it for free?
klipitkas•2mo ago
I am paying for it out of pocket. Its free for you to use, but not for me to host it :)
shadows1•2mo ago
Good luck with your future mim data sniffing or selective takeovers, I guess? Not sure what the business model would be, unless you’re planning on injecting ads, which would be funny.
hashworks•2mo ago
Why does everything have to be a business model?
Fokamul•2mo ago
...", Russian FSB manager, 2025
charlie-83•2mo ago
Unless the author is insanely rich, they probably don't want to spend increasingly large amounts on hosting unless they have a way to make money back (even if it's just to break even).
klipitkas•2mo ago
I am not rich and I don't need to be to keep this service up and running at least for the near future.
pcthrowaway•2mo ago
To keep this up and running for 2-3 years, you probably do need to be rich, or to find a way to monetize.

It's possible when it gets to be a drain, even charging pennies for the service could drive off the bad actors making it unsustainable though.

klipitkas•2mo ago
For the foreseeable future and unless there is massive abuse, which I am trying to contain, it will remain free.
klipitkas•2mo ago
Thanks, but I don't have such plans, lol.
zarzavat•2mo ago
The question is, how is it sustainable? Nobody likes being rug pulled. Why not charge money for it?

I'd rather pay a few dollars for a service that will be around 5 years from now, than pay nothing and have to deal with churn.

klipitkas•2mo ago
I can't promise anything this is a pet project. I might turn it into an open source project, and I might also provide some kind of service for a few bucks if it gets traction.
stevekemp•2mo ago
If you keep this up you'll want to add yourself to the public suffix list:

https://publicsuffix.org/

You should also consider grouping your random hostnames under a dedicated subdomain. e.g. "xxx-xxx-xxx.users.tunnl.gg", that separates out cookies and suchlike.

qudat•2mo ago
I run a similar site (https://pico.sh) with public urls and thought the same thing for us. The public suffix has some fuzzy limits on usage size before they will add domains (e.g. on the scale of thousands of active users).

I don’t have tunnl.gg usage numbers but I’m going to guess they are no where near the threshold — we were also rejected.

phrotoma•2mo ago
I just want to say that I love pico.sh <3
qudat•2mo ago
much appreciated!
ramon156•2mo ago
How does this compare to cloudflare or even a self-hosted tailscale tunnel?

Also do you collect any data? Privacy says

> We do not collect, store, or sell your personal data.

But I guess personal data is a bit ambiguous. You're at the very least collecting my IP (which is fine, I'm just curious)

klipitkas•2mo ago
Yes that is true (the IP is collected), what I meant is that we don't explicitly collect data on purpose.
d1sxeyes•2mo ago
If you’re in the EU or have users in the EU, that distinction matters, and you should be more precise. You likely have a solid legitimate use case for collecting IPs under the GDPR, but only if you’re fully transparent.
klipitkas•2mo ago
I updated the terms, thanks for the heads up.
computer•2mo ago
You are mentioning it's encrypted end-to-end; please explain how your server is unable to read the contents of the stream?
klipitkas•2mo ago
That is wrong (and I need to update any docs that mention this), the traffic is not encrypted end to end, we do TLS termination on our side. From that point on traffic is forwarded back as plain HTTP. However I would in any case not suggest to host any production applications using this service. It is mostly for local dev testing.
Fokamul•2mo ago
Why not just buy trial or cheap VM? Are devs that lazy now? Or is this aimed on vibe "devs"? :D
Zambyte•2mo ago
To some people (students, people in low income countries) there are no cheap hosted VMs.
klipitkas•2mo ago
Agreed and even devs who have the money, most of the times don't have the time.
klipitkas•2mo ago
It's not my target audience. Also as a dev I hate spending more than a couple of seconds to do this. This service exists mainly to scratch my own itch.
szemy2•2mo ago
How is it different to ngrok? Genuinely curious, I might switch.
klipitkas•2mo ago
Not really that different, besides any kind of time limitations or number of request limitations.
BinaryIgor•2mo ago
Interesting! How do you handle port conflicts? What ports for public exposure are available?
ritcgab•2mo ago
Curious about this as well.
klipitkas•2mo ago
On the VPS we use: - 80 (standard http) - 443 (standard https) - 22 (obv for standard ssh) - 9090 (metrics / internal so I can have an idea of the generic usage like reqs/s and active connections)

Client-Side: The -R 80:localhost:8080 Explained The 80 in -R 80:localhost:8080 is not a real port on the server. It's a virtual bind port that tells the SSH client what port to "pretend" it's listening on.

No port conflicts - The server doesn't actually bind to port 80 per tunnel. Each tunnel gets an internal listener on 127.0.0.1:random (ephemeral port). The 80 is just metadata passed in the SSH forwarded-tcpip channel. All public traffic comes through single port 443 (HTTPS), routed by subdomain.

So What Ports Are "Available" to Users?

Any port - because it doesn't matter! Users can specify any port in -R: ssh -t -R 80:localhost:3000 proxy.tunnl.gg # Works ssh -t -R 8080:localhost:3000 proxy.tunnl.gg # Also works ssh -t -R 3000:localhost:3000 proxy.tunnl.gg # Also works ssh -t -R 1:localhost:3000 proxy.tunnl.gg # Even this works!

The number is just passed to the SSH client so it knows which forwarded-tcpip requests to accept. The actual routing is done by subdomain, not port.

Why Use 80 Convention?

It's just convention - many SSH clients expect port 80 for HTTP forwarding. But functionally, any number works because:

- Server extracts BindPort from the SSH request - Stores it in the tunnel struct - Sends it back in forwarded-tcpip channel payload - Client matches on this to forward to correct local port - The "magic" is that all 1000 possible tunnels share the same public ports (22, 80, 443) and are differentiated by subdomain.

BinaryIgor•2mo ago
Nicely done! Thanks for the detailed answer ;)
bashy•2mo ago
Shell function;

``` tunnl() { if [ -z "$1" ]; then echo "Usage: tunnl <local-port>" return 1 fi

  ssh -t -R 80:localhost:"$1" proxy.tunnl.gg
} ```

There's also https://tunnelmole.com but requires binary or npm install

madethemcry•2mo ago
I used ngrok when it was the to-go answer for serving localhost (temporarily, not permanent) to the public, but the last time I searched for alternatives I stumbled upon the following jewel.

   > tailscale funnel 3000

   Available on the internet:

   https://some-device-name.tail12345.ts.net/
   |-- proxy http://127.0.0.1:3000

   Press Ctrl+C to exit.

I've tailscale installed on my machine anyway for some connected devices. But even without this would convince me using it, because it's part of the free tier, dead simple and with tailscale it's coming from kind of a trusted entity.
klipitkas•2mo ago
I am also using tailscale for a few projects as well. Feel free to use whatever you trust more or works for you.
madethemcry•2mo ago
Hey, I didn't mean to sell another tool over yours! It's just an experience that popped into my mind and I wanted to share. I appreciate your work and contributing to the problem space of exposing a local service. Thank you.
bomewish•2mo ago
Hey really recommend using a big long random string in that URL, because as you will have read above TAILNET NAMES ARE PUBLIC. You can find them here: https://crt.sh/?Identity=ts.net [warning, this will probably crash browser if you leave it open too long -- but you can see it's full of tailnet domains].

So anyway try it like:

tailscale funnel --set-path=/A8200B0F-6E0E-4FE2-9135-8A440DB9469D http://127.0.0.1:8001 or whatever

I use uuidgen and voila.

ftchd•2mo ago
so what exactly does this do?
bomewish•1mo ago
Gives you a randomised domain name for your service so it’s not exposed to the internet on the url that has already been publicly exposed.
tarasyarema•2mo ago
Is this any different from localtunnel? Nice thing about that one is that its oss, actually we forked it in my company to do some more custom stuff.

Any plan to make it oss?

https://github.com/desplega-ai/localtunnel-server

klipitkas•2mo ago
I am actually thinking about making it open source yes, probably after I adjust the code a little bit :D maybe today or in a couple of days.
tambre•2mo ago
Seemingly lacking IPv6 support?

Not that you'd usually need this if you have IPv6 but might still be useful to bypass firewalls or forward access for IPv4 clients from your newer IPv6-only resources.

klipitkas•2mo ago
Indeed there is no IPv6 support yet.
oliviergg•2mo ago
It's bit less convenient, but I have access to a vps and a dns with a custom domain.

I can create any subdomain I want and tunnel the connexion to any port on my computer.

=> I can spinup a new subdomain in seconds, no data leakage, url that doesn't change, and it's cost nothing.

klipitkas•2mo ago
Whatever works for you best :)
gnyman•2mo ago
This is nice and for those who's asking, it's different from ngrok and the others in that you don't need a separate client, (almost) everyone has ssh installed.

To the author, I wish you best of luck with this but be aware (if you aren't) this will attract all kind of bad and malicious users who want nothing more than a "clean" IP to funnel their badness through.

serveo.net [2] tried it 8 years ago, but when I wanted to use it I at some point I found it was no longer working, as I remember the author said there was too much abuse for him to maintain it as a free service

I ended up self-hosting sish https://docs.ssi.sh instead.

Even the the ones where you have to register like cloudflare tunnels and ngrok are full of malware, which is not a risk to you as a user but means they are often blocked.

Also a little rant, tailscale has their own one also called funnel. It has the benefit of being end-to-end encrypted (in theory) but the downside that you are announcing your service to the world through the certificate transparency logs. So your little dev project will have bots hammering on it (and trying to take your .git folder) within seconds from you activating the funnel. So make sure your little project is ready for the internet with auth and has nothing sensitive at guessable paths.

[2] https://news.ycombinator.com/item?id=14842951

resiros•2mo ago
It would be nice to have an open-source version that you can self-host. That would solve the abuse problem. Maybe with a service to create API keys.
klipitkas•2mo ago
Yeah, this is the next step. I first wanted to understand if this gets any traction. I think I will provide a dockerized version for the server part that you can just run with a simple command and maybe some interface to create api keys and distribute them to your users.
popalchemist•2mo ago
Fair enough from a business standpoint, but seeing as there are massive privacy/security risks involved in exposing your data to an opaque service, the open source component is probably a non-optional aspect of the value prop.
rgbrgb•2mo ago
how come? just because it's open source doesn't mean that they run that exact binary on their servers. ngrok does pretty well without open sourcing.
popalchemist•2mo ago
The locus of trust moves, if you have the source, and trust is a factor for you, because you can simply self-host and know what you're running.
PLG88•2mo ago
fwiw, ngrok started as open source
cyberax•2mo ago
We're using pgrok for that in our organization. A small EC2 instance serves as the public endpoint.
klipitkas•2mo ago
Thanks for the kind words. I hope I won't have to close this service in a few days due to abuse but its a weird world we live in.
pcthrowaway•2mo ago
Do you have funding to cover the paying the bandwidth costs which will ultimately result from this? Or if you're running this from a home network, does anyone know if OP should be concerned of running into issues with their ISP?
kilobaud•2mo ago
The tunnel host appears to be a Hetzner server, they are pretty generous with bandwidth but the interesting thing I learned about doing some scalability improvements at a similar company [0] is that for these proxy systems, each direction’s traffic is egress bandwidth. Good luck OP, the tool looks cool. Kinda like pinggy.

[0] https://localxpose.io

klipitkas•2mo ago
I can cover hundreds of PB of bandwidth per month if needed without paying a fortune.
kilobaud•2mo ago
Can you share more details? I know Hetzner offers unlimited bandwidth in some cases but I thought it limited only to servers with the 1Gbs uplink
aamoscodes•2mo ago
Work closet /s
jjcm•2mo ago
As someone who has launched something free on HN before, the resulting signups were around 1/3rd valid users doing cool things and checking things out, and 2/3rds nefarious users.
tonymet•2mo ago
a bit better benevolent:malicious ratio than the real world
hrimfaxi•2mo ago
2/3rds of people in the world are malicious?
tonymet•2mo ago
2/3 of resources will typically be spent by malicious/nefarious/abusive users.

[edit] for clarity

dlenski•2mo ago
Dare I ask how much bandwidth it is consuming?
klipitkas•2mo ago
Its around 700MB today so far.
patricklorio•2mo ago
I run playit.gg. Abuse is a big problem on our free tier. I’d get https://github.com/projectdiscovery/nuclei setup to scan your online endpoints and autoban detections of c2 servers.
jborak•2mo ago
Thanks for sharing this. I run packetriot.com, another tunneling service and I ended up writing my own scanner for endpoints using keyword lists I gathered from various infosec resources.

I had done some account filtering for origins coming out of Tor, VPN networks, data centers, etc. but I recently dropped those and added an portal page for free accounts, similar to what ngrok does.

It was very effective at preventing abuse. I also added mechanism for reporting abuse on the safety page that's presented.

patricklorio•2mo ago
Have you found a way to detect xworm c2c servers?
jborak•2mo ago
Our services were used for C2 as well. I investigated it a bit but eventually decided to just drop TCP forwarding from our free-tier and that reduced our abuse/malware reports for C2 over TCP to zero essentially.

One path I looked at was to use the VirusTotal API to help identify C2's that other security organizations were identifying and leverage that to automatically take down malicious TCP endpoints. I wrote some POCs but did not deploy them. It's something I plan on taking up again at some point next year.

patricklorio•2mo ago
Want to chat on discord? Maybe we could combine efforts to try and stop people abusing our services :). We have a few vendors sending us automated reports, maybe I could open it up for multiple projects.

feel free to give me a ping on https://discord.gg/AXAbujx @patrick.

ValdikSS•2mo ago
My service (which doesn't have public access, only via SSH as a client) was used by a ransomware gang, which involved the service in investigation from Dutch CERT and Dubai police.

It's still live though.

apitman•2mo ago
A few other options as well: https://github.com/anderspitman/awesome-tunneling
kej•2mo ago
Just want to say that I appreciate you maintaining this list. It's one of those things I need to do every now and then, so having a place that gives me a current summary of the options is very handy.
LelouBil•2mo ago
OpenSSH is preinstalled on Windows as well, so I think it's not a stretch to say everyone has ssh now.
sorz•2mo ago
Random thoughts: one can get user's ssh public keys from GitHub on the fly (from `https://github.com/<username>.keys`), so that it requires a valid GitHub account to use this service, without (extra) auth process.
rollingstone23•2mo ago
I have used serveo.net in the past for the same use case, this looks cool !
1vuio0pswjnm7•2mo ago
"We cooperate with law enforcement agencies when required by law. While we do not inspect traffic content, we will provide connection logs and IP address information in response to valid legal process (such as a subpoena or court order) to assist in investigations regarding illegal activity."

https://tunnl.gg/assets/index-Bjpn0hFX.js

If the requesting party knows it's possible they might ask for traffic to be logged

klipitkas•2mo ago
I can also deny, if I don't consider the case valid or shutdown the hosted service if I want to. I plan to open source it anyway within the next days.
gaws•2mo ago
> I can also deny if I don't consider the case valid

It wouldn't take much for law enforcement or a judge to force cooperation.

cush•2mo ago
How do the Certs work for https?
watermelon0•2mo ago
I'd assume it uses a single wildcard certificate.
klipitkas•2mo ago
Yes, thats exactly how it works for the multiple subdomains.
FrinkleFrankle•2mo ago
If you want to do this another way, Tailscale funnel can send public traffic into your tailnet Traefik supports pulling the Tailscale cert from its socket.
raggi•2mo ago
Periodic reminder that just because Go having an easy to use SSH package made these easy to write, connecting to SSH servers and doing TOFU all the time with the keys is far far less safe than webpki, and this service could be relatively easily mitm'd in key scenarios like people being tricked at conferences. It's not as terrifying as the coffee shop taking payments over SSH, but still, this isn't doing E2EE, it's terminating TLS upstream.

There's no SSHFP record (not that openssh uses it by default, and you'd need DNSSEC to make it actually useful), and no public keys documented anywhere to help people avoid MITM/TOFU events.

I get the UX, but it saddens me to see more SSH products that don't understand the SSH security model.

fuzzy_biscuit•2mo ago
I love the concept, but I have one gripe: the subscription email is coming from a Gmail address, so I have no trust. I'd love to see it coming from the same domain. Also, it went to spam.
klipitkas•2mo ago
Hey, I updated this to be a tunnl.gg domain, thanks.
ValdikSS•2mo ago
I'm running the similar but different, protocol-agnostic service: https:/ssh-j.com/

Only regular SSH to serve, regular SSH to connect. No public URLs though (it's not for web services).

rohan_•2mo ago
Does this just wrap cloudflare tunnels?
ZuzuDuck•1mo ago
I like this idea, maybe I'll use it in my next project