logoalt Hacker News

notsylveryesterday at 6:14 AM4 repliesview on HN

I think people are misunderstanding. This isn't CT logs, its a wildcard certificate so it wouldn't leak the "nas" part. It's sentry catching client-side traces and calling home with them, and then picking out the hostname from the request that sent them (ie, "nas.nothing-special.whatever.example.com") and trying to poll it for whatever reason, which is going to a separate server that is catching the wildcard domain and being rejected.


Replies

spondylyesterday at 6:39 AM

My first thought was perhaps they're trying to fetch a favicon for rendering against the traces in the UI?

show 1 reply
hsbauauvhabzbyesterday at 6:48 AM

Sounds like a great way to get sentry to fire off arbitrary requests to IPs you don’t own.

sure hope nobody does that targeting ips (like that blacklist in masscan) that will auto report you to your isp/ans/whatever for your abusive traffic. Repeatedly.

show 1 reply
doctorpanglossyesterday at 7:52 PM

people are misunderstanding because the blog post is really confusing and poorly written haha