When internal hostnames are leaked to the clown
81 points
by zdw
1 hour ago
| 8 comments
| rachelbythebay.com
| HN
b1temy
30 minutes ago
[-]
Is "clown GCP Host" a technical term I am unaware of, or is the author just voicing their discontent?

Seems to me that the problem is the NAS's web interface using sentry for logging/monitoring, and part of what was logged were internal hostnames (which might be named in a way that has sensitive info, e.g, the corp-and-other-corp-merger example they gave. So it wouldn't matter that it's inaccessible in a private network, the name itself is sensitive information.).

In that case, I would personally replace the operating system of the NAS with one that is free/open source that I trust and does not phone home. I suppose some form of adblocking ala PiHole or some other DNS configuration that blocks sentry calls would work too, but I would just go with using an operating system I trust.

reply
jraph
18 minutes ago
[-]
> Is "clown GCP Host" a technical term I am unaware of, or is the author just voicing their discontent?

Clown is Rachel's word for (Big Tech's) cloud.

reply
senectus1
3 minutes ago
[-]
amusingly its a term used by my co-wrokers to describe anyone thats not them.
reply
notsylver
33 minutes ago
[-]
I think people are misunderstanding. This isn't CT logs, its a wildcard certificate so it wouldn't leak the "nas" part. It's sentry catching client-side traces and calling home with them, and then picking out the hostname from the request that sent them (ie, "nas.nothing-special.whatever.example.com") and trying to poll it for whatever reason, which is going to a separate server that is catching the wildcard domain and being rejected.
reply
spondyl
8 minutes ago
[-]
My first thought was perhaps they're trying to fetch a favicon for rendering against the traces in the UI?
reply
NitpickLawyer
38 minutes ago
[-]
Not sure why they made the connection to sentry.io and not with CT logs. My first thought was that "*.some-subdomain." got added to the CT logs and someone is scanning *. with well known hosts, of which "nas" would be one. Curious if they have more insights into sentry.io leaking and where does it leak to...
reply
jraph
8 minutes ago
[-]
That hypothesis seems less likely and more complicated than the sentry one.

Scanning wildcards for well-known subdomains seems both quite specific and rather costly for unclear benefits.

reply
stingraycharles
50 minutes ago
[-]
I don’t understand. How could a GCP server access the private NAS?

I agree the web UI should never be monitored using sentry. I can see why they would want it, but at the very least should be opt in.

reply
minitech
43 minutes ago
[-]
It couldn’t, but it tried.
reply
throwaway290
45 minutes ago
[-]
It said knocking, not accessing

also

> you notice that you've started getting requests coming to your server on the "outside world" with that same hostname.

reply
TZubiri
23 minutes ago
[-]
>Hope you didn't name it anything sensitive, like "mycorp-and-othercorp-planned-merger-storage", or something.

So, no one competent is going to do this, domains are not encrypted by HTTPS, any sensitive info is pushed to the URL Path.

I think being controlling of domain names is a sign of a good sysadmin, it's also a bit schizophrenic, but you gotta be a little schizophrenic to be the type of sysadmin that never gets hacked.

That said, domains not leaking is one of those "clean sheet" features that you go for no reason at all, and it feels nice, but if you don't get it, it's not consequential at all. It's like driving at exactly 50mph, like having a green streak on github. You are never going to rely on that secrecy if only because some ISP might see that, but it's 100% achievable that no one will start pinging your internal host and start polluting your hosts (if you do domain name filtering).

So what I'm saying is, I appreciate this type of effort, but it's a bit dramatic. Definitely uninstall whatever junk leaked your domain though, but it's really nothing.

reply
jraph
1 minute ago
[-]
> any sensitive info is pushed to the URL Path

This too is not ideal. It gets saved in the browser history, and if the url is sent by message (email or IM), the provider may visit it.

> Definitely uninstall whatever junk leaked your domain though, but it's really nothing.

We are used to the tracking being everywhere but it is scandalous and should be considered as such. Not the subdomain leak part, that's just how Rachel noticed, but the non advertised tracking from an appliance chosen to be connected privately.

reply
fragmede
41 minutes ago
[-]
This highlights a huge problem with LetsEncrypt and CT logs. Which is that the Internet is a bad place, with bad people looking to take advantage of you. If you use LetsEncrypt for ssl certs (which you should), that hostname gets published to the world, and that server immediately gets pummeled by requests for all sorts of fresh install pages, like wp-admin or phpmyadmin, from attackers.
reply
krautsauer
3 minutes ago
[-]
That may be related, but it's not what happened here. Wildcard-cert and all.
reply
jesterson
10 minutes ago
[-]
> If you use LetsEncrypt for ssl certs (which you should)

You meant you shouldn't right? Partially exactly for the reasons you stated later in the same sentence.

reply
thakoppno
28 minutes ago
[-]
> the Internet is a bad place

FWIW - it’s made of people

reply
TZubiri
21 minutes ago
[-]
No, it's made by systems made by people, systems which might have grown and mutated so many times that the original purpose and ethics might be unrecognizable to the system designers. This can be decades in the case of tech like SMTP, HTTP, JS, but now it can be days in the era of Moltbots and vibecoding.
reply
Spivak
39 minutes ago
[-]
I like only getting *.domain for this reason. No expectation of hiding the domain but if they want to figure out where other things are hosted they'll have to guess.
reply
ttoinou
32 minutes ago
[-]
So how do you get this ?
reply
rossy
14 minutes ago
[-]
Let's Encrypt can issue wildcard certs too
reply
ranger_danger
1 hour ago
[-]
Pennywise found my hostname? We're cooked.
reply
defrost
49 minutes ago
[-]
You're IT, I'm IT, We're all IT.
reply
TeapotNotKettle
49 minutes ago
[-]
Misconfigured clown - bad news indeed.
reply
dcrazy
57 minutes ago
[-]
Slightly surprised that this blog seems to have succumbed to inbound traffic.
reply
that_lurker
54 minutes ago
[-]
Opens fine for me
reply