frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Sping – An HTTP/TCP latency tool that's easy on the eye

https://dseltzer.gitlab.io/sping/docs/
35•zorlack•3h ago•3 comments

The two versions of Parquet

https://www.jeronimo.dev/the-two-versions-of-parquet/
130•tanelpoder•3d ago•31 comments

Busy beaver hunters reach numbers that overwhelm ordinary math

https://www.quantamagazine.org/busy-beaver-hunters-reach-numbers-that-overwhelm-ordinary-math-202...
32•defrost•2d ago•4 comments

Ghrc.io appears to be malicious

https://bmitch.net/blog/2025-08-22-ghrc-appears-malicious/
241•todsacerdoti•3h ago•30 comments

Is 4chan the perfect Pirate Bay poster child to justify wider UK site-blocking?

https://torrentfreak.com/uk-govt-finds-ideal-pirate-bay-poster-boy-to-sell-blocking-of-non-pirate...
171•gloxkiqcza•10h ago•127 comments

We put a coding agent in a while loop

https://github.com/repomirrorhq/repomirror/blob/main/repomirror.md
126•sfarshid•10h ago•93 comments

Prison isn’t set up for today’s tech so we have to do legal work the old way

https://prisonjournalismproject.org/2025/08/19/prisons-outdated-technology-hurts-our-chances-at-f...
68•danso•3h ago•33 comments

Making games in Go: 3 months without LLMs vs. 3 days with LLMs

https://marianogappa.github.io/software/2025/08/24/i-made-two-card-games-in-go/
259•maloga•12h ago•180 comments

My ZIP isn't your ZIP: Identifying and exploiting semantic gaps between parsers

https://www.usenix.org/conference/usenixsecurity25/presentation/you
41•layer8•3d ago•14 comments

A Brilliant and Nearby One-off Fast Radio Burst Localized to 13 pc Precision

https://iopscience.iop.org/article/10.3847/2041-8213/adf62f
48•gnabgib•7h ago•6 comments

How to check if your Apple Silicon Mac is booting securely

https://eclecticlight.co/2025/08/21/how-to-check-if-your-apple-silicon-mac-is-booting-securely/
40•shorden•3h ago•8 comments

Y Combinator files brief supporting Epic Games, says store fees stifle startups

https://www.macrumors.com/2025/08/21/y-combinator-epic-games-amicus-brief/
78•greenburger•3d ago•62 comments

Trees on city streets cope with drought by drinking from leaky pipes

https://www.newscientist.com/article/2487804-trees-on-city-streets-cope-with-drought-by-drinking-...
151•bookofjoe•2d ago•79 comments

How many paths of length K are there between A and B? (2021)

https://horace.io/walks
15•jxmorris12•7h ago•2 comments

Burner Phone 101

https://rebeccawilliams.info/burner-phone-101/
284•CharlesW•4d ago•107 comments

Everything I know about good API design

https://www.seangoedecke.com/good-api-design/
199•ahamez•8h ago•77 comments

Cloudflare incident on August 21, 2025

https://blog.cloudflare.com/cloudflare-incident-on-august-21-2025/
143•achalshah•2d ago•29 comments

Halt and Catch Fire Syllabus (2021)

https://bits.ashleyblewer.com/halt-and-catch-fire-syllabus/
105•Kye•6h ago•27 comments

Show HN: Clearcam – Add AI object detection to your IP CCTV cameras

https://github.com/roryclear/clearcam
164•roryclear•15h ago•47 comments

GNU cross-tools: musl-cross 313.3M

https://github.com/cross-tools/musl-cross
17•1vuio0pswjnm7•4h ago•2 comments

Iterative DFS with stack-based graph traversal (2024)

https://dwf.dev/blog/2024/09/23/2024/dfs-iterative-stack-based
27•cpp_frog•3d ago•2 comments

NASA's Juno mission leaves legacy of science at Jupiter

https://www.scientificamerican.com/article/how-nasas-juno-probe-changed-everything-we-know-about-...
65•apress•3d ago•27 comments

Stepanov's biggest blunder? The curious case of adjacent difference

https://mmapped.blog/posts/43-stepanovs-biggest-blunder
39•signa11•3d ago•8 comments

Bash Strict Mode

http://redsymbol.net/articles/unofficial-bash-strict-mode/
4•dcminter•2d ago•2 comments

Comet AI browser can get prompt injected from any site, drain your bank account

https://twitter.com/zack_overflow/status/1959308058200551721
490•helloplanets•11h ago•173 comments

OS Yamato lets your data fade away

https://github.com/osyamato/os-yamato
17•tsuyoshi_k•3d ago•13 comments

Claim: GPT-5-pro can prove new interesting mathematics

https://twitter.com/SebastienBubeck/status/1958198661139009862
118•marcuschong•4d ago•79 comments

Show HN: I Built a XSLT Blog Framework

https://vgr.land/content/posts/20250821.xml
31•vgr-land•9h ago•11 comments

Will at centre of legal battle over Shakespeare’s home unearthed after 150 years

https://www.theguardian.com/culture/2025/aug/21/will-at-centre-of-legal-battle-over-shakespeares-...
43•forthelose•1d ago•14 comments

Uncle Sam shouldn't own Intel stock

https://www.wsj.com/opinion/uncle-sam-shouldnt-own-intel-stock-ccd6986d
77•aspenmayer•5h ago•97 comments
Open in hackernews

Don't pick weird subnets for embedded networks, use VRFs

https://blog.brixit.nl/dont-pick-weird-subnets-for-embedded-networks/
99•LorenDB•3d ago

Comments

mindslight•3d ago
The real official answer is to register/allocate a new subnet, with no intention of putting it into the global routing tables. IPv6 only comes into play because doing that with IPv4 is mostly impractical these days.

The author lost me when they got into raw iproute commands. Not because I'm not acquainted (I run my own custom complex router using a standard Linux distro). But rather if someone knows enough to configure things at this level, then they would just come to this solution on their own. Most people trying to solve this problem will not - eg think that mobile video rack belonging to a touring musician.

Readily-accessible solutions I can come up with off the top of my head:

1. Two off the shelf routers and double NAT. The middle network can be changed if it conflicts with the outer network

2. One router/NAT, but two IP networks on the inner network - one statically assigned for devices to communicate with each other, and one assigned via DHCP for accessing the horizon through NAT. That second network can then easily be changed.

3. Play battleship more strategically using class E address space, DOD/BigCo address space, and/or smaller subnets in the middle of the customary size for a range (eg 192.168.1.160/27).

MartijnBraam•3d ago
Allocating a subnet is way further away from reality for most people than configuring one router feature on the router they're using.

There's also a lot of people that configure these devices (or linux routers) themselves but have never heard of VRFs, you got to learn about them somewhere so I just hope this helps some people :)

mindslight•3d ago
I see your point if someone is at the level of tinkering enough to learn Mikrotik gear. I was loosely equating VRF with general Linux policy routing, where you end up owning a bit more of an overarching config with fwmarks etc. And then I reasoned that Mikrotik was more complex than that, because I personally avoid doing config on my Mikrotik devices in favor of the Linux router (which is the opposite if you're coming at it unopinionated). But if someone wants to understand just enough networking to copy and paste Mikrotik examples, I do think your post is good general suggestion for that.
stirfish•3d ago
I've been using a router as 4.20.69.1. It's good to hear other solutions, as I've just been figuring it all out as I go along
JSR_FDED•2d ago
I’ve never had any issues using a .666 subnet
master_crab•8h ago
If I can avoid Double NATing, I do because it tends to degrade network performance and can have interesting characteristics on some inbound traffic (although that depends on the use case).

But the third option honestly isn’t recommended enough. DoD space is rarely routable, and if you are on a private network already, even moreso. It’s also less common than RFC1918.

However, there is one caveat. Some large corporates do use it for just the same reason. Even though it is rarer than 10 or 172 space, you’d be surprised how many large orgs do run DoD internally.

(Disclaimer: I use DoD space for my travel router at hotels)

1oooqooq•6h ago
can't they just put each port on it's own vlan and call it a day?
McNulty2•3d ago
As a network engineer it was interesting to read about VRFs and routing from the perspective of an A/V engineer. Thanks
dlcarrier•3d ago
It's still difficult to find equipment and ISPs that reliably work with IPv6. I'm sure it will be ready for prime time in the next decade or two, right when we get fusion power plants, self driving cars that don't require supervision, and the AI singularity.
whatevaa•2d ago
We will never get rid of ipv4. Apparently my country ISPs have more ipv4 than they need (they actually rent them to others), so they just don't bother with ipv6.
cassianoleal•1d ago
I guess when the world moves away from IPv4, your country will have the entire IPv4 space for itself, and massive headaches with NAT to route out, and the relative impossibility to route in.
john01dav•2d ago
I think that government intervention here is needed in order to coordinate people. We'll all be better off once ivp4 is dead and buried, but the incentive for each entity to do so is minimal. It could be some other powerful entity instead of government, for example tier 1 ISPs degrading ipv4 performance substantially or Google delisting websites that don't support ipv6 (and eventually delisting websites that do support ipv4).
dlcarrier•2d ago
Really? The network protocol someone uses is so critical that it should be illegal to use the wrong one? What happens when IPv9 becomes the hot new thing, but everyone is stuck on IPv6, because of some outdated government regulation? Do Americans have the right to use whatever internet protocol they want, under the first amendment?

IPv6 has made enough progress that it's totally possible to run your network off of it, regardless of what everyone else is doing, and if all of your neghbors are using IPv4, it won't harm your IPv6 network.

Also, part of the delay in the switch to IPv6 is that some work is needed to ensure that home routers and IoT devices default to reasonable security settings, and the absolute worst thing to do is force them to switch first, and figure out security later.

The answer isn't to force everyone to use something before its ready; the answer is to address every impediment, so it's worth it for everyone to switch. Sure it's slower, but it's much better than making users worse off by switching, converting them to detractors instead of supporters.

HWR_14•5h ago
> We'll all be better off once ivp4 is dead and buried

Doesn't IPv6 hurt anonymity? NAT is annoying, but hides the number of devices you have. ISPs assigning you different IPs at different times at least provides some measure of identity resetting.

To say nothing of how easy it is to keep IPv4 devices confined the local network

Or am I missing something?

grgergo•5h ago
IPv6 has temporary addresses for privacy.

https://en.wikipedia.org/wiki/IPv6_address#Temporary_address...

gruez•4h ago
It's still strictly worse than the privacy you get with ivp4 + NAT. Even with privacy addresses, a device has its own unique (but rotating) address, so it can be uniquely identified. Contrast this with ipv4 + NAT where all devices share the same address, and the only identifying characteristic is the port, which changes on a per-connection basis. On a typical home networking scenario this is handy, because it means advertisers can distinguish traffic coming from your daughter's phone between traffic coming from your PC. With ipv4 they're mixed under one IP address, and you need to resort to various forms of fingerprinting to distinguish them. On a public VPN server this basically kills privacy, which is probably why all the VPNs I've encountered are ipv4 only.
boredatoms•26m ago
If you really want to, you can NAT the v6 just like you do with v4
1718627440•2d ago
Maybe I'm dumb, but how do hosts from different subnets address each other, when they get the same IP addresses?
majormunky•2d ago
In the VRF case they can't: "This comes with a tradeoff of course and in this case is that you no longer can reach devices on the venue network, which shouldn't be a problem if you're only connected there for internet connectivity."
1718627440•2d ago
Ok, but why want you to connect to local networks, when they can't reach each other, wouldn't you just then connect to the upstream router instead?
SoftTalker•7h ago
That's typically all you care about, the upstream router/gateway so you can get to the internet. But it's on the local network, so you need to connect to it.
treesknees•7h ago
I’ve encountered this issue with Docker. They randomly assign an RFC1918 subnet for internal services, and occasionally, this subnet clashes with a genuine corporate network or IP address. This can be quite frustrating to troubleshoot, especially if you’re not involved in Docker networking on a daily basis.
theideaofcoffee•5h ago
I've also run into this issue a lot, especially in AWS when developers with less networking experience start randomly picking VPC subnets (why they were doing that is a whole 'nuther issue). They wonder why connectivity in docker on their ec2 hosts doesn't work, by default docker chooses 172.17/16 which seems to be a common choice for VPC subnets. Annoying, but a teachable moment nonetheless.
jcalvinowens•6h ago
I've always been able to solve this problem more simply using IPv4 link-local addressing (https://www.rfc-editor.org/rfc/rfc3927), it doesn't matter if somebody abuses the same range because the outbound interface is explicitly specified in sin6_scope_id passed to connect() and bind().

But if you're writing code at a higher level than the bsd sockets api, it's a whole can of worms.

champtar•6h ago
2 big address block that have few chances of conflict:

- CGNAT 100.64.0.0/10

- "Benchmark" 198.18.0.0/15

telotortium•6h ago
CGNAT is used by Tailscale and presumably in the wild for its intended purpose.
Lammy•5h ago
And `100.115.92.0/23` is used by ChromeOS for PatchPanel: https://chromium.googlesource.com/chromiumos/platform2/+/mai...