frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

When internal hostnames are leaked to the clown

https://rachelbythebay.com/w/2026/02/03/badnas/
117•zdw•2h ago•50 comments

Don't rent the cloud, own instead

https://blog.comma.ai/datacenter/
83•Torq_boi•1h ago•25 comments

Voxtral Transcribe 2

https://mistral.ai/news/voxtral-transcribe-2
855•meetpateltech•16h ago•211 comments

Postgres Postmaster does not scale

https://www.recall.ai/blog/postgres-postmaster-does-not-scale
80•davidgu•15h ago•26 comments

ICE seeks industry input on ad tech location data for investigative use

https://www.biometricupdate.com/202602/ice-seeks-industry-input-on-ad-tech-location-data-for-inve...
143•WaitWaitWha•2h ago•60 comments

Sqldef: Idempotent schema management tool for MySQL, PostgreSQL, SQLite

https://sqldef.github.io/
134•Palmik•3d ago•33 comments

A few CPU hardware bugs

https://www.taricorp.net/2026/a-few-cpu-bugs/
31•signa11•3h ago•5 comments

Claude Code: connect to a local model when your quota runs out

https://boxc.net/blog/2026/claude-code-connecting-to-local-models-when-your-quota-runs-out/
256•fugu2•3d ago•130 comments

OpenClaw is what Apple intelligence should have been

https://www.jakequist.com/thoughts/openclaw-is-what-apple-intelligence-should-have-been
280•jakequist•7h ago•249 comments

The TV industry concedes that the future may not be in 8K

https://arstechnica.com/gadgets/2026/01/lg-joins-the-rest-of-the-world-accepts-that-people-dont-w...
4•cxrlosfx•4d ago•2 comments

Wirth's Revenge

https://jmoiron.net/blog/wirths-revenge/
18•signa11•4h ago•0 comments

AI is killing B2B SaaS

https://nmn.gl/blog/ai-killing-b2b-saas
315•namanyayg•14h ago•494 comments

Claude Code for Infrastructure

https://www.fluid.sh/
201•aspectrr•13h ago•147 comments

A case study in PDF forensics: The Epstein PDFs

https://pdfa.org/a-case-study-in-pdf-forensics-the-epstein-pdfs/
280•DuffJohnson•16h ago•153 comments

Microsoft's Copilot chatbot is running into problems

https://www.wsj.com/tech/ai/microsofts-pivotal-ai-product-is-running-into-big-problems-ce235b28
194•fortran77•15h ago•214 comments

Remarkable Pro Colors

https://www.thregr.org/wavexx/rnd/20260201-remarkable_pro_colors/
93•ffaser5gxlsll•3d ago•33 comments

Why S7 Scheme? (2020)

https://iainctduncan.github.io/scheme-for-max-docs/s7.html
15•bmacho•4d ago•3 comments

Building a 24-bit arcade CRT display adapter from scratch

https://www.scd31.com/posts/building-an-arcade-display-adapter
152•evakhoury•14h ago•43 comments

An interactive version of Byrne's The Elements of Euclid (1847)

https://c82.net/euclid/
17•tzury•2d ago•2 comments

I built a search engine to index the un-indexable parts of Telegram

https://telehunt.org
10•alenmangattu•3d ago•2 comments

Listen to Understand

https://talk.bradwoods.io/blog/listen-to-understand/
34•bradwoodsio•3d ago•6 comments

Why more companies are recognizing the benefits of keeping older employees

https://longevity.stanford.edu/why-more-companies-are-recognizing-the-benefits-of-keeping-older-e...
109•andsoitis•8h ago•39 comments

Tractor

https://incoherency.co.uk/blog/stories/tractor.html
172•surprisetalk•1d ago•55 comments

Lily Programming Language

https://lily-lang.org
33•FascinatedBox•3d ago•27 comments

The Great Unwind

https://occupywallst.com/yen
242•jart•13h ago•208 comments

Study: Older Cannabis Users Have Larger Brains, Better Cognition

https://news.cuanschutz.edu/news-stories/study-finds-cannabis-usage-in-middle-aged-and-older-adul...
3•emptybits•2h ago•1 comments

Child prodigies rarely become elite performers

https://www.economist.com/science-and-technology/2026/01/14/why-child-prodigies-rarely-become-eli...
104•i7l•5h ago•81 comments

How not to securely erase a NVME drive (2022)

https://peterbabic.dev/blog/how-not-to-securely-erase-nvme-drive/
49•transpute•4d ago•35 comments

Claude is a space to think

https://www.anthropic.com/news/claude-is-a-space-to-think
432•meetpateltech•19h ago•232 comments

RS-SDK: Drive RuneScape with Claude Code

https://github.com/MaxBittker/rs-sdk
108•evakhoury•14h ago•41 comments
Open in hackernews

When internal hostnames are leaked to the clown

https://rachelbythebay.com/w/2026/02/03/badnas/
114•zdw•2h ago

Comments

ranger_danger•1h ago
Pennywise found my hostname? We're cooked.
TeapotNotKettle•1h ago
Misconfigured clown - bad news indeed.
defrost•1h ago
You're IT, I'm IT, We're all IT.
bonesss•30m ago
We all use floats down here.
dcrazy•1h ago
Slightly surprised that this blog seems to have succumbed to inbound traffic.
that_lurker•1h ago
Opens fine for me
unsnap_biceps•43m ago
If you're on an apple device, disable private relay. It appears the blog has tar pitted private relay traffic.
bhaney•27m ago
It's tar pitting my normal unproxied residential traffic too
stingraycharles•1h ago
I don’t understand. How could a GCP server access the private NAS?

I agree the web UI should never be monitored using sentry. I can see why they would want it, but at the very least should be opt in.

throwaway290•1h ago
It said knocking, not accessing

also

> you notice that you've started getting requests coming to your server on the "outside world" with that same hostname.

minitech•1h ago
It couldn’t, but it tried.
copperx•45m ago
A for effort, F for firewall.
fragmede•1h ago
This highlights a huge problem with LetsEncrypt and CT logs. Which is that the Internet is a bad place, with bad people looking to take advantage of you. If you use LetsEncrypt for ssl certs (which you should), that hostname gets published to the world, and that server immediately gets pummeled by requests for all sorts of fresh install pages, like wp-admin or phpmyadmin, from attackers.
Spivak•1h ago
I like only getting *.domain for this reason. No expectation of hiding the domain but if they want to figure out where other things are hosted they'll have to guess.
ttoinou•1h ago
So how do you get this ?
rossy•1h ago
Let's Encrypt can issue wildcard certs too
hsbauauvhabzb•49m ago
That’s really not a great fix. If those hostnames leak, they leak forever. I’d be surprised if AV solutions and/or windows aren’t logging these things.
thakoppno•1h ago
> the Internet is a bad place

FWIW - it’s made of people

TZubiri•1h ago
No, it's made by systems made by people, systems which might have grown and mutated so many times that the original purpose and ethics might be unrecognizable to the system designers. This can be decades in the case of tech like SMTP, HTTP, JS, but now it can be days in the era of Moltbots and vibecoding.
jesterson•1h ago
> If you use LetsEncrypt for ssl certs (which you should)

You meant you shouldn't right? Partially exactly for the reasons you stated later in the same sentence.

josh3736•44m ago
Let's Encrypt has nothing to do with this problem (of Certificate Transparency logs leaking domain names).

CA/B Forum policy requires every CA to publish every issued certificate in the CT logs.

So if you want a TLS certificate that's trusted by browsers, the domain name has to be published to the world, and it doesn't matter where you got your certificate, you are going to start getting requests from automated vulnerability scanners looking to exploit poorly configured or un-updated software.

Wildcards are used to work around this, since what gets published is *.example.com instead of nas.example.com, super-secret-docs.example.com, etc — but as this article shows, there are other ways that your domain name can leak.

So yes, you should use Let's Encrypt, since paying for a cert from some other CA does nothing useful.

jesterson•32m ago
Statistically amount of parasite scanning on LE "secured" domains is way more compared to purchased certficates. And yes, this is without voluntary publishing on LE side.

I am not entirely aware what LE does differently, but we had very clear observation in the past about it.

krautsauer•55m ago
That may be related, but it's not what happened here. Wildcard-cert and all.
NitpickLawyer•1h ago
Not sure why they made the connection to sentry.io and not with CT logs. My first thought was that "*.some-subdomain." got added to the CT logs and someone is scanning *. with well known hosts, of which "nas" would be one. Curious if they have more insights into sentry.io leaking and where does it leak to...
jraph•1h ago
That hypothesis seems less likely and more complicated than the sentry one.

Scanning wildcards for well-known subdomains seems both quite specific and rather costly for unclear benefits.

rawling•30m ago
I feel like the author would have noticed and said so if she was getting logs for more than just the one host.
A1kmm•25m ago
But she mentioned: 1) it isn't in DNS only /etc/hosts and 2) they are making a connection to it. So they'd need to get the IP address to connect to from somewhere as well.
notsylver•1h ago
I think people are misunderstanding. This isn't CT logs, its a wildcard certificate so it wouldn't leak the "nas" part. It's sentry catching client-side traces and calling home with them, and then picking out the hostname from the request that sent them (ie, "nas.nothing-special.whatever.example.com") and trying to poll it for whatever reason, which is going to a separate server that is catching the wildcard domain and being rejected.
spondyl•59m ago
My first thought was perhaps they're trying to fetch a favicon for rendering against the traces in the UI?
n0w•9m ago
They're likely trying to retrieve source maps
hsbauauvhabzb•50m ago
Sounds like a great way to get sentry to fire off arbitrary requests to IPs you don’t own.

sure hope nobody does that targeting ips (like that blacklist in masscan) that will auto report you to your isp/ans/whatever for your abusive traffic. Repeatedly.

leoc•38m ago
Obligatory Bruce Scneier: https://www.schneier.com/blog/archives/2008/03/the_security_...
b1temy•1h ago
Is "clown GCP Host" a technical term I am unaware of, or is the author just voicing their discontent?

Seems to me that the problem is the NAS's web interface using sentry for logging/monitoring, and part of what was logged were internal hostnames (which might be named in a way that has sensitive info, e.g, the corp-and-other-corp-merger example they gave. So it wouldn't matter that it's inaccessible in a private network, the name itself is sensitive information.).

In that case, I would personally replace the operating system of the NAS with one that is free/open source that I trust and does not phone home. I suppose some form of adblocking ala PiHole or some other DNS configuration that blocks sentry calls would work too, but I would just go with using an operating system I trust.

jraph•1h ago
> Is "clown GCP Host" a technical term I am unaware of, or is the author just voicing their discontent?

Clown is Rachel's word for (Big Tech's) cloud.

senectus1•54m ago
amusingly its a term used by my co-wrokers to describe anyone thats not them.
jraph•49m ago
Oh well... I suppose humility is your coworker's defining quality? :-)
dehrmann•37m ago
She was (or is) at Facebook, and "clowntown" and "clowny" are words you see there.
mintplant•35m ago
"Clownshoes" is common as an adjective at Mozilla.
jraph•3m ago
> She was (or is) at Facebook

was (and she worked at Google too)

> "clowntown" and "clowny" are words you see there.

Didn't know this, interesting!

TZubiri•1h ago
>Hope you didn't name it anything sensitive, like "mycorp-and-othercorp-planned-merger-storage", or something.

So, no one competent is going to do this, domains are not encrypted by HTTPS, any sensitive info is pushed to the URL Path.

I think being controlling of domain names is a sign of a good sysadmin, it's also a bit schizophrenic, but you gotta be a little schizophrenic to be the type of sysadmin that never gets hacked.

That said, domains not leaking is one of those "clean sheet" features that you go for no reason at all, and it feels nice, but if you don't get it, it's not consequential at all. It's like driving at exactly 50mph, like having a green streak on github. You are never going to rely on that secrecy if only because some ISP might see that, but it's 100% achievable that no one will start pinging your internal host and start polluting your hosts (if you do domain name filtering).

So what I'm saying is, I appreciate this type of effort, but it's a bit dramatic. Definitely uninstall whatever junk leaked your domain though, but it's really nothing.

jraph•52m ago
> any sensitive info is pushed to the URL Path

This too is not ideal. It gets saved in the browser history, and if the url is sent by message (email or IM), the provider may visit it.

> Definitely uninstall whatever junk leaked your domain though, but it's really nothing.

We are used to the tracking being everywhere but it is scandalous and should be considered as such. Not the subdomain leak part, that's just how Rachel noticed, but the non advertised tracking from an appliance chosen to be connected privately.

TZubiri•8m ago
>This too is not ideal. It gets saved in the browser history, and if the url is sent by message (email or IM), the provider may visit it.

Sure. POST for extra security.

> Not the subdomain leak part, that's just how Rachel noticed, but the non advertised tracking from an appliance chosen to be connected privately.

If this were a completely local product, like say a USB stick. Sure. but this is a Network Attached Storage product, and the user explicitly chose to use network functions (domains, http), it's not the same category of issue.

Jolter•17m ago
Obl. nitpick: you mean paranoia, presumably. Schizophrenia is a dissociative/psychotic disorder, paranoia is the irrational belief that you’re being persecuted/watched/etc.

Btw, in this case it can’t be paranoia since the belief was not irrational - the author was being watched.

TZubiri•10m ago
You are right, I meant paranoid.

>Btw, in this case it can’t be paranoia since the belief was not irrational - the author was being watched.

Yes, but I mean being overly cautious in the threat model. For example, birds may be watching through my window, it's true and I might catch a bird watching my house, but it's paranoid in the sense that it's too tight of a threat model.

jraph•4m ago
I know analogies are not meant to be perfect, but birds don't mass watch, and don't systematically watch every of your moves neither.
teekert•46m ago
Is this a Chrome/Edge thing? Or do privacy respecting browsers also do this? If so, it's unexpected.

If Firefox also leaks this, I wonder if this is something mass-surveillance related.

(Judging from the down votes I misunderstood something)

that_guy_iain•25m ago
This is actually an really interesting way to attack a sensitive network. This is a way of allowing to map the internal network of a sensitive network. Getting access is obviously the main challenge but once you're in there you need to know where you go and what to look for. If you've already got that knowledge when planning the attack to gain entry then you've got the upper-hand. So while it kinda seems like "Ok, so they have a hostname they can't access why do I care?". If you're doing high-end security on your system admin level then this is the sort of small nitpicking that it takes to be the best.
zaptheimpaler•12m ago
Oh god this sucks, i've been setting up lots of services on my NAS pointing to my own domains recently. Can't even name the domains on my own damn server with an expectation of privacy now.