Readit News logoReadit News
dunder_cat commented on The switch to Linux and the beginning of my self-hosting journey   hazemkrimi.tech/blog/linu... · Posted by u/kingcrimson1000
drnick1 · 17 hours ago
Why was this posted to HN? There is nothing new or original in the setup presented. People have been self-hosting all kinds of things on commodity hardware for decades, even things said to be "impossible" to self-host like email.

Also, nobody should be buying an (overpriced) Raspberry Pi for self-hosting, when used mini-PCs are faster, more reliable (no SD card, better cooling), and often cheaper.

Finally, I don't think you should use Proxmox in a home setting: too much abstraction, too much overhead (mainly memory). Use Docker where it makes sense, and deploy the rest bare metal.

dunder_cat · 17 hours ago
There's nothing new or original in a lot of things that get posted here. Reading about someone starting a journey provides an interesting catalyst for discussion. What they did right, what they did wrong, other things to try, or even just providing a push to someone else to also try.

I'll take my turn on the soapbox to say I hope people keep posting about their adventures and misadventures in trying something new. I'd much rather be reading that than seeing yet another post on LLM-based agentic startups or pelicans riding bicycles.

dunder_cat commented on The Holy Grail of Linux Binary Compatibility: Musl and Dlopen   github.com/quaadgras/grap... · Posted by u/Splizard
dunder_cat · 16 days ago
Related discussion (the actual project is mentioned in the issue): "Detour: Dynamic linking on Linux without Libc" https://news.ycombinator.com/item?id=45740241
dunder_cat commented on IPv6 is not insecure because it lacks a NAT   johnmaguire.me/blog/ipv6-... · Posted by u/johnmaguire
wiredpancake · 21 days ago
There was a report a few years back about people running NTP servers to harvest IPv6 addresses.

Security via obscurity will only get you so far.

dunder_cat · 21 days ago
In theory, IPv6 Privacy Extensions (https://datatracker.ietf.org/doc/html/rfc4941) could mitigate this. In practice, I imagine when you bind to `[::]:port`, that also means that the randomized addresses would work for new inbound connections, too. Not sure how long they typically last, but you'd be fighting against the clock at least before a new randomized address.

That being said, on a slightly less common note: it is quite possible to have each individual service running on a /128. E.g. on IPv6 k8s clusters, each pod can have a publicly addressable /128, so activities like NTP would require the container to have an NTP client in it to expose in that way. That'd mitigate a good chunk of information exposure -- that being said, I agree with the larger point about security via obscurity being insufficient.

dunder_cat commented on Verizon starts requiring 365 days of paid service before it will unlock phones   arstechnica.com/tech-poli... · Posted by u/voxadam
dunder_cat · 21 days ago
I'm glad I stumbled across this: life circumstances have allowed me go abroad for a trip the past two years. One thing I had forgotten about since the last trip were some of my group being unable to get one of the cheap prepaid data eSIMs because their phone was still locked to the carrier. I've been tempted to replace my aging iPhone SE 2022 (^1) with a trade-in deal and get a new phone, but it never occurred to me that would mean being forced to use AT&T's $10/day (capped at $100 in one billing cycle) "International Day Pass" during future trips until it had been paid off for long enough.

(^1) I wish I wasn't so tempted after ~4 years, but the battery health has dropped to 75% and the performance has suffered dramatically. A new battery is on the table I suppose, but I am split between just putting that money towards a new phone.

dunder_cat commented on IP Addresses Through 2025   potaroo.net/ispcol/2026-0... · Posted by u/petercooper
Ericson2314 · 22 days ago
Really need governments to start pushing harder on IPv6 adoption. We need sticks, not just carrots. My favorite is chaos engineering forced IPv4 downtime.
dunder_cat · 22 days ago
In the US, I really want the FCC to mandate that an ISP provides IPv6 connectivity in order to meet the criteria to be considered broadband (and access the subsidies related to that). Don't even care if the functionality is off by default / you have to call and agree the routing may be sub-optimal, whatever. I currently use HE tunnels but on top of additional latency, the HE <-> Cogent peering dispute still makes it difficult to access services over IPv6.
dunder_cat commented on Ask HN: Weird archive.today behavior?    · Posted by u/rabinovich
dunder_cat · a month ago
Hmm. If it is an attempt at DDoS attacks, it's probably not very fruitful:

  >$ resolvectl query gyrovague.com

  gyrovague.com: 192.0.78.25                     -- link: eno1
                 192.0.78.24                     -- link: eno1
Viewing the first IP address on https://bgp.he.net/ip/192.0.78.25 shows AS2635 (https://bgp.he.net/AS2635) is announcing 192.0.78.0/24. AS2635 is owned by https://automattic.com aka wordpress.com. I assume that for a managed environment at their scale, this is just another Wednesday for them.

dunder_cat · a month ago
It occurred to me while reading the article that I could also just have checked the TLS cert. The cert I was given presents "Common Name tls.automattic.com". However, maybe someone will discover bgp.he.net via this :-)
dunder_cat commented on Ask HN: Weird archive.today behavior?    · Posted by u/rabinovich
dunder_cat · a month ago
Hmm. If it is an attempt at DDoS attacks, it's probably not very fruitful:

  >$ resolvectl query gyrovague.com

  gyrovague.com: 192.0.78.25                     -- link: eno1
                 192.0.78.24                     -- link: eno1
Viewing the first IP address on https://bgp.he.net/ip/192.0.78.25 shows AS2635 (https://bgp.he.net/AS2635) is announcing 192.0.78.0/24. AS2635 is owned by https://automattic.com aka wordpress.com. I assume that for a managed environment at their scale, this is just another Wednesday for them.

dunder_cat commented on A new vulnerability on IPv6 parsing in linux   nvd.nist.gov/vuln/detail/... · Posted by u/flyahn06
LegionMammal978 · a year ago
It looks like this is just a kernel memory leak? I suppose it could lead to DoS attacks from untrusted containers, but that seems to be the extent of it.

Also, the issue seems to be with storing already-parsed IPv6 addresses, not with actually parsing them.

dunder_cat · a year ago
It seems to be about a GRE tunnel implementation too:

From https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux...

> The device stores IPv6 addresses that are used for encapsulation in linear memory that is managed by the driver.

> Changing the remote address of an ip6gre net device never worked properly, but since cited commit the following reproducer [1] would result in a warning [2] and a memory leak [3]. The problem is that the new remote address is never added by the driver to its hash table (and therefore the device) and the old address is never removed from it.

I wasn't familiar with the 'mlxsw' module so I found this on GitHub which was quite helpful: https://github.com/Mellanox/mlxsw/wiki. Seems the impact is even more niche (i.e. this won't be affecting most people's cloud VMs and regular linux desktop/mobile users):

> mlxsw: Mellanox Technologies is the first hardware vendor to use the switchdev API to offload the kernel's forwarding plane to a real ASIC. Mellanox's/Nvidia's current switchdev-based solution is focused on Spectrum ASICs.

u/dunder_cat

KarmaCake day34November 16, 2024
About
__cat__
View Original