frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

Show HN: BunkerWeb – the open-source and cloud-native WAF

https://docs.bunkerweb.io/latest/
68•bnkty•7h ago

Comments

qmarchi•6h ago
While neat, I feel like in the current age of "let's throw shitloads of packets and see how they like that", this solves _a problem_, but I feel that most of the security products solve it by anycasting IP ranges.

Neat to see another use case for NGNIX though!

jqpabc123•6h ago
How is this better than Caddy?
bnkty•3h ago
Caddy does not offer full application protection besides HTTPS and basic stuff.
dontTREATonme•6h ago
Is there a significant difference between this and nginx proxy manager?
justusthane•5h ago
They're both reverse proxies built on nginx, but the whole point of BunkerWeb is that it's a WAF, which NPM is not, so that's a significant difference.

In short, NPM doesn't do any of the stuff listed under Security Features here: https://docs.bunkerweb.io/latest/#security-features

jeauxlb•4h ago
NPM will automate Let's Encrypt certificate generation but you're right about the other listed features.
lta•6h ago
I'm still strongly suspecting this whole WAF thing is mostly complete bullshit intended for projects doing security works mostly from spreadsheets.

Could someone with a proper background in security confirm or invalidate my suspicion ?

daeken•5h ago
I mean ... You're not completely wrong, but you're not completely right either. For context: I've been working full-time in security for 15 years and on the fringes (reversing) for many more.

WAFs in and of themselves provide virtually zero security. They can block naive attacks -- catching the most obvious payloads -- and act as an early-warning signal that an attack may be underway (though the SNR on this is awful). But frankly, this is far less important in practice than the fact that it just makes things more difficult and annoying for attackers. Enough so that it can make a semi-attractive target into a no-go.

This is like defense-in-depth, but instead of layering protections in place so that the holes in the swiss cheese don't like up, you're making the cheese smell awful enough to ignore the juicy apple behind it.

If you're a valuable enough target, they're gonna go for the apple regardless of how bad the cheese is. ... And this analogy may have gotten away from me.

macNchz•4h ago
In addition to defense-in-depth—simply adding a bunch of imperfect layers and acknowledging that no individual layer like this is all that effective on its own—there’s a component of creating signal: it can be pretty trivial for a motivated attacker to bypass a WAF, however it may not be trivial to do so without creating a paper trail of event logs, which can be used to trigger automated blocks or escalate alarms for a human to intervene.
mac-chaffee•4h ago
I'd generally confirm that suspicion: https://www.macchaffee.com/blog/2023/wafs/

WAFs have a few valid uses in my opinion: "virtual patching" and the ability to create custom rules such as blocking/challenging/rate limiting obviously bad traffic. But the giant rulesets are actively harmful IMO. "Defense in depth" is not a valid justification for doing something actively harmful to both your users and the time budget of your security team.

ivanr•3h ago
+1 Absolutely. (Source: Original author of ModSecurity.)
mmarian•3h ago
Just wanted to say that it's a great blog post, thanks for writing it!
ethan_smith•2h ago
WAFs aren't bullshit but have limitations - they're effective against known attack patterns (SQLi, XSS) but can be bypassed with sophisticated techniques. They're best as one layer in a defense-in-depth strategy, not a complete security solution.
josephcsible•2h ago
You are correct. Actual security needs to be inherently part of the application; you can't get it just by slapping something in front of it. And the way most WAFs work is basically just a fancier version of what https://thedailywtf.com/articles/Injection_Rejection does, which is horrifically bad on sites where people try to discuss HTML or SQL.
noobcoder•5h ago
Is the syntax same as nginx?
bnkty•3h ago
Custom nginx configs are supported (more info here : https://docs.bunkerweb.io/latest/advanced/#custom-configurat...) but BunkerWeb also includes its own list of settings.
chrismorgan•5h ago
Your site talks of BunkerWeb PRO, which is, by the sound of it, not open source. But I have no idea what is actually different about it: https://panel.bunkerweb.io/knowledgebase/105/What-is-BunkerW... flatly doesn’t answer the question: “additional features and services responding to professional needs” is impressively vague.
bnkty•3h ago
Features with a crown icon are PRO, you will find full list of free and PRO features here : https://docs.bunkerweb.io/latest/features/
chrismorgan•3h ago
Might I suggest at the very least linking to that from https://panel.bunkerweb.io/knowledgebase/105/What-is-BunkerW... and https://panel.bunkerweb.io/store/bunkerweb-pro.
sreekanth850•5h ago
How this compare against safeline?
jnettome•4h ago
I just love this project! BunkerWeb was a huge help when I was self-hosting my products with Docker Swarm. It offers tons of configuration options—especially useful for those needing a WAF and dealing with heavy bot traffic.

Since moving to Kubernetes, I haven’t used or evaluated it there yet, but kudos to the team for continuing to update and improve the project. Keep up the great work!

bnkty•3h ago
Thanks for the kind words!

Kubernetes integration is really awesome, you can use BunkerWeb ingress controller or mix it with an existing ingress controller.

seymon•3h ago
What's the benefit of just using plain owasp modsecurity?

It also exists as a docker container as an nginx reverse proxy with modsecurity extension.

https://coreruleset.org/docs/6-development/6-6-useful_tools/...

bnkty•3h ago
ModSecurity doesn't offer antibot, bad behavior, certificate management, ... You can find the full list of features here : https://docs.bunkerweb.io/latest/features/
SbEpUBz2•1h ago
I can't unban myself from the demo :)

LLMs caused drastic vocabulary shift in biomedical publications

https://www.science.org/doi/10.1126/sciadv.adt3813
55•em3rgent0rdr•1h ago•21 comments

Mini NASes marry NVMe to Intel's efficient chip

https://www.jeffgeerling.com/blog/2025/mini-nases-marry-nvme-intels-efficient-chip
171•ingve•4h ago•71 comments

EverQuest

https://www.filfre.net/2025/07/everquest/
74•dmazin•3h ago•27 comments

How to Incapacitate Google Tag Manager and Why You Should (2022)

https://backlit.neocities.org/incapacitate-google-tag-manager
26•fsflover•1h ago•5 comments

Why I left my tech job to work on chronic pain

https://sailhealth.substack.com/p/why-i-left-my-tech-job-to-work-on
215•glasscannon•6h ago•136 comments

Compression Dictionary Transport

https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Compression_dictionary_transport
47•todsacerdoti•4h ago•4 comments

Eight dormant Satoshi-era Bitcoin wallets reactivated after 14 yrs

https://twitter.com/WatcherGuru/status/1941167512491864554
38•amrrs•41m ago•15 comments

Kepler.gl

https://kepler.gl/
85•9woc•5h ago•10 comments

Air Pollution May Contribute to Development of Lung Cancer in Never-Smokers

https://today.ucsd.edu/story/air-pollution-may-contribute-to-development-of-lung-cancer-in-never-smokers-new-study-finds
10•gmays•51m ago•2 comments

Show HN: I AI-coded a tower defense game and documented the whole process

https://github.com/maciej-trebacz/tower-of-time-game
147•M4v3R•6h ago•86 comments

UpCodes (YC S17) is hiring a Head of Ops to automate construction compliance

https://up.codes/careers?utm_source=HN
1•Old_Thrashbarg•2h ago

Writing a Game Boy Emulator in OCaml

https://linoscope.github.io/writing-a-game-boy-emulator-in-ocaml/
188•ibobev•9h ago•31 comments

Larry (cat)

https://en.wikipedia.org/wiki/Larry_(cat)
189•dcminter•9h ago•46 comments

``Free as Air, Free as Water, Free as Knowledge'' (1992)

http://bactra.org/Sterling/Free_as_the_Air_Free_as_Water_Free_as_Knowledge.html
11•whoopdedo•3d ago•1 comments

Gremllm

https://github.com/awwaiid/gremllm
14•andreabergia•2h ago•3 comments

Bcachefs may be headed out of the kernel

https://lwn.net/Articles/1027289/
54•ksec•5h ago•48 comments

Is an Intel N100 or N150 a better value than a Raspberry Pi?

https://www.jeffgeerling.com/blog/2025/intel-n100-better-value-raspberry-pi
202•transpute•7h ago•177 comments

Lens: Lenses, Folds and Traversals

https://hackage.haskell.org/package/lens
52•hyperbrainer•3d ago•17 comments

ChatGPT creates phisher's paradise by serving the wrong URLs for major companies

https://www.theregister.com/2025/07/03/ai_phishing_websites/
19•josephcsible•52m ago•0 comments

Can Large Language Models Play Text Games Well?

https://arxiv.org/abs/2304.02868
45•willvarfar•8h ago•29 comments

In a milestone for Manhattan, a pair of coyotes has made Central Park their home

https://www.smithsonianmag.com/science-nature/in-a-milestone-for-manhattan-a-pair-of-coyotes-has-made-central-park-their-home-180986892/
88•sohkamyung•3d ago•79 comments

Show HN: BunkerWeb – the open-source and cloud-native WAF

https://docs.bunkerweb.io/latest/
68•bnkty•7h ago•25 comments

Wind Knitting Factory

https://www.merelkarhof.nl/work/wind-knitting-factory
197•bschne•22h ago•54 comments

Zig breaking change – initial Writergate

https://github.com/ziglang/zig/pull/24329
167•Retro_Dev•15h ago•179 comments

A Rust-TypeScript integration

https://github.com/beeeeep54/rust-typescript
41•wreedtyt•7h ago•44 comments

Show HN: A cross-platform terminal emulator written in Java

https://github.com/sebkur/forceterm
46•sebkur•3d ago•7 comments

The Novelty of the Arpanet

https://twobithistory.org/2021/02/07/arpanet.html
3•xk3•3d ago•0 comments

Rust and WASM for Form Validation

https://sebastian.lauwe.rs/blog/rust-wasm-form-validation/
34•slau•7h ago•15 comments

Killer whales groom each other with pieces of kelp

https://www.science.org/content/article/killer-whales-groom-each-other-pieces-kelp
74•noleary•3d ago•42 comments

Logging Shell Commands in BusyBox? Yes, You Can Now

http://carminatialessandro.blogspot.com/2025/06/logging-shell-commands-in-busybox-yes.html
10•acarminati•3d ago•0 comments