For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | more pgraf's commentsregister

Genuinely curious, how would you block an attacker from getting to your SSH port without knowing the path you will connect from (which is the case for remote access) at configuration time? I don‘t see how Path-Aware Networking would replace a VPN solution


The SCION Book goes over a lot of potential solutions that are possible because of the architecture, but my favorite is hidden paths. https://scion.docs.anapaya.net/en/latest/hidden-paths.html

> Hidden path communication enables the hiding of specific path segments, i.e. certain path segments are only available for authorized ASes. In the common case, path segments are publicly available to any network entity. They are fetched from the control service and used to construct forwarding paths.


FYI, 84% of ID has voted pro chat-control in 2021.

https://mepwatch.eu/9/vote.html?v=134463&eugroup=ID


I stand corrected. Guess all that posturing about privacy was all empty election promises then.

Seems like only the Greens, the left and within ID the AFD voted against.


Just be aware that with your strategy “blocking 50% of unwanted traffic” means blocking non-attack traffic, as these Internet security companies are mostly legitimate. The automated attack traffic that you actually want to block is in the other half and will frequently change IPs.


> these Internet security companies are mostly legitimate

This is both subjective and highly dependent upon the scope of services being run. My setup would probably progressively create more hassle than it saves as on a scale from small business to large business. For the setup I have, I quite specifically want to block their traffic.

I'm possibly overly militant about this, but they keep databases of the results of their scans, and their business is selling this information to ... whoever's buying. I don't want my IP addresses, open ports, services or any other details they're able to gather to be in these databases over which I have no control and didn't authorise.

To steal an oft-used analogy, they're taking snapshots of all the houses on all the streets and identifying the doors, windows, gates, and having a peek inside, and recording all the results in a database.

I believe all of them are illegitimate. They 'do' because they can, and it's profitable. "Making the internet safer" is not their raison d'être.

Happy for any else to form their own opinion, but this is my current stance.


Yes - Anyone who's FAQ answer to "How to avoid being scanned" is "We don't have an opt-out, you must block all these addresses" isn't behaving like a legit business.

"Nice network you've got there."

"We noticed something might be open. We're not telling you what it is."

"It would be a pity if something happened to your business."

"Give us lots of money."

Sounds like a movie strong-arm thug.


Would be cool to have a "don't scan me bro" list of IP's that engage in this that we could share - is there such a thing?


The problem is that becomes a concentrator of IPs behind which privacy conscious individuals exist, which probably has higher value to "whoever's buying". It's a conundrum.


It sounds like what GP is suggesting is to collect ips of all the scanners, and share the list of ips among ourselves, so we can collectively route their traffic to /dev/null.


aaaaah, that makes sense. See the links in my original post.


Why not also sell the scans of scanners to the scanners customers and make a little pocket change?


There's a comment downthread discussing something similar; I haven't tried it though: https://news.ycombinator.com/item?id=40695179


You're being sarcastic, right? We did this for telephone numbers and saw how it turned out...


> these Internet security companies are mostly legitimate

Act like a bot, get treated like a bot.

> Just be aware that with your strategy “blocking 50% of unwanted traffic” means blocking non-attack traffic

You don't block them forever, just enough for them to move on to someone else.


they dont move on to someone else, they scan entire internet on a regular basis, just like gogle crawls web pages


My experience is that after blocking Censys, unwanted traffic on non-standard ports from other IP blocks has basically gone to zero. It appears to me that some bad actors are using Censys scans for targeting.


i get similar results


> (...) as these Internet security companies are mostly legitimate.

Note that you're basing your assertion on the motivation of random third parties exclusively on the fact that they exist and they are behind active searches for vulnerabilities.


Lol legitimate. As legitimate as door to door salesmen. OP just put up a proverbial "no soliciting" sign.


Imagine a major bridge that was built by a contractor. A internal safety inspector repeatedly warned his supervisors of structural deficiencies that could lead to the collapse of the bridge. Furthermore, in the pass of time two external sources publicly warned about the issue, but the company downplayed the importance. Finally, the bridge collapses. It becomes evident that the company did nothing about the issue because it didn‘t want to loose contracts selling more flawed bridges. The public would justifiably go nuts, and there would be legal consequences for everyone involved.

What is different in our industry that companies (and managers) get away with such malice?


Here in Norway a bridge built with known structural deficiencies did in fact collapse[1], and basically nothing has happened except tax payers get to pay even more for a new bridge.

Unless enough lives are lost, people generally don't care that much it seems.

[1]: https://www.nrk.no/innlandet/statens-vegvesen-legg-fram-rapp...


I'm not sure if this would line up with the Dunbar number or something similar, but it sure seems reasonable that societies and centralized power should never grow beyond the scale where people stop caring.

If the public is expected to keep government and corporstions in check but the public doesn't care, it can only end poorly.


> basically nothing has happened

Maybe they proudly stated knowing the risks, and while unfortunate, risks became reality. And then everything is fine.


Boeing in a nutshell.

>What is different in our industry that companies (and managers) get away with such malice?

Software isn't immediately life threatening. That's why it's all thr wild west outside of medical and aerospace. While it sucks to have PI leaked to the internet, you do have time to at least take action compared to a door in an airplane coming off.


> Software isn't immediately life threatening

being a boeing whistleblower is though


I don't understand how this doesn't destroy a company. They willfully ingored a serious risk and it had major national security implications.


Have you tried to use Google customer support


>What is different in our industry that companies (and managers) get away with such malice?

Lack of professional licensure that binds you to state regulation with jail time as one of the stated punishments besides financial liability.

Heh, the government could start effecting change by mandating licensure and sign-offs by licensed individuals when contracting for software products sold to the government.


Wasn't there something a bit like that with the Morandi bridge that collapsed in Italy?

(There was definitely something like that with the Mottarone cable car that had been running for years with the safety catch disabled. When the tow-rope snapped, wiht no catch, the cabin rushed down and killed everyone on board.)


So software developers should be criminally liable for introducing security bugs?


Management that knowingly chooses to ignore a major issue should be charged with criminal negligence. The creation of the bug is a common and difficult to avoid mistake. But once it has been found, choosing not to change it despite being warned if the consequences makes you responsible for those consequences.


So if send an email "Fix all your bugs or else bad stuff will happen", and if they don't fix all their bugs now I can put their devs in jail ?


Don't be obtuse. That is obviously not a genuine bug/vuln disclosure.


And you decide what is genuine?

Sorry, this whole thread is a fantasy of nerds thinking they can create a punitive policy for behavior they don't like. But there is no actual substantive framework under which any of these fantasies can come true.


knowingly? yes.


What standard do you suggest to prove intent?


How about the same as for fraud, manslaughter, conspiracy... But that's the judiciary's problem anyway. People who campaign for this higher accountability argue that it's such a drastic change from fines that it will change company cultures overnight.


A policy proposal needs a legal framework under which can actually can work. You can't just push that off as "that's the judiciary's problem".


It is true that nothing is 100% secure. Sitting on a major security vulnerability internally with a motivated employee pushing to fix it and doing nothing for business reasons is not negligence, but malice. People in the chain of command need to be held accountable for this.


TLDR: A Denial-of-Service vulnerability triggered via cache poisoning on registry.npmjs.org which can render individual packages inaccessible

I don't see the big security impact that the headline suggests, as active big-scale exploitation would likely be quickly noticed and fixed. The most interesting attack vector IMHO would be to block individual security fixes to packages on a small scale.


> would likely be quickly noticed and fixed

Fixed as in fixing the exploit that TFA is reporting? Isn’t that the point of their report?


Perhaps, but it could also be fixed/mitigated by cycling the cache state and blocking bots. It might also be something that can be blocked in a web proxy.

It's interesting, but I share the thought that the impact is overstated.


Shouldn’t HTTP compression reap most of the benefits of this approach for bigger pages?


Which… is largely fed to our livestock?


If you want less rainforest torn down to grow soybeans, eat more soybeans.


Soybeans aren't just good for food, they can be turned into fuel and plastics.


Can anyone elaborate which (proposed) advantages LionsOS has over Genode?


Just as new to LionsOS as you are, but it has a much more permissive license, and it’s not dual licensed. I think this will make it easier for people to support the project.


Correctness via formal verification - at least in the core of sel4.


Genode can also run on sel4.


Are its TCB and integration similarly verified? If not formally-verified, are they in a safe language or statically analyzed to block common errors?


I mean, LionOS appears to (with the exception of sel4 itself) be mainly written in unverified C without heavy static analysis.

So LionOS and Genode appear to be about equal in that regard.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You