by zdw on 2/5/26, 5:22 AM with 252 comments
by notsylver on 2/5/26, 6:14 AM
by b1temy on 2/5/26, 6:16 AM
Seems to me that the problem is the NAS's web interface using sentry for logging/monitoring, and part of what was logged were internal hostnames (which might be named in a way that has sensitive info, e.g, the corp-and-other-corp-merger example they gave. So it wouldn't matter that it's inaccessible in a private network, the name itself is sensitive information.).
In that case, I would personally replace the operating system of the NAS with one that is free/open source that I trust and does not phone home. I suppose some form of adblocking ala PiHole or some other DNS configuration that blocks sentry calls would work too, but I would just go with using an operating system I trust.
by andix on 2/5/26, 3:05 PM
It can be useful to hide a private service behind a URL that isn't easy to guess (less attack surfaces, because a lot of attackers can't find the service). But it needs to be inside the URL path, not the hostname.
bad: my-hidden-fileservice-007-abc123.example.com/
good: fileservice.example.com/my-hidden-service-007-abc123/
In the first example the name is leaked with DNS queries, TLS certificates and many other possibilities. In the second example the secret path is only transmitted via HTTPS and doesn't leak as easy.by yabones on 2/5/26, 1:56 PM
It's treating a symptom rather than a disease, but what else can we do?
by atmosx on 2/5/26, 7:43 AM
Using LE to apply SSL to services? Complicated. Non standard paths, custom distro, everything hidden (you can’t figure out where to place the ssl cert of how to restart the service, etc). Of course you will figure it out if you spent 50 hours… but why?
Don’t get me started with the old rsync version, lack of midnight commander and/or other utils.
I should have gone with something that runs proper Linux or BSD.
by mike-cardwell on 2/5/26, 12:47 PM
Bit of a pain to set this all up though. I run a number of services on my home network and I always stick Nginx in front with a restrictive CSP policy, and then open that policy up as needed. For example, I'm running Home Assistant, and I have the Steam plugin, which I assume is responsible for requests from my browser like for: https://avatars.steamstatic.com/HASH_medium.jpg, which are being blocked by my injected CSP policy
P.S. I might decide to let that steam request through so I can see avatars in the UI. I also inject "Referrer-Policy: no-referrer", so if I do decide to do that, at least they wont see my HA hostname in there logs by default.
by TZubiri on 2/5/26, 6:24 AM
So, no one competent is going to do this, domains are not encrypted by HTTPS, any sensitive info is pushed to the URL Path.
I think being controlling of domain names is a sign of a good sysadmin, it's also a bit schizophrenic, but you gotta be a little schizophrenic to be the type of sysadmin that never gets hacked.
That said, domains not leaking is one of those "clean sheet" features that you go for no reason at all, and it feels nice, but if you don't get it, it's not consequential at all. It's like driving at exactly 50mph, like having a green streak on github. You are never going to rely on that secrecy if only because some ISP might see that, but it's 100% achievable that no one will start pinging your internal host and start polluting your hosts (if you do domain name filtering).
So what I'm saying is, I appreciate this type of effort, but it's a bit dramatic. Definitely uninstall whatever junk leaked your domain though, but it's really nothing.
by ggm on 2/5/26, 7:39 AM
Public services see one way (no TCP return flow possible) from almost any source IP. If you can tie that from other corroborated data, the same: you see packets from "inside" all the time.
Darknet collection during final /8 run-down captured audio in UDP.
Firewalls? ACLs? Pah. Humbug.
by mixedbit on 2/5/26, 9:08 AM
by 1vuio0pswjnm7 on 2/6/26, 5:08 PM
https://blog.sentry.io/sentry-ingestion-domains-updates/
https://cloud.google.com/blog/topics/partners/using-sentry-t...
https://old.reddit.com/r/PleX/comments/1b12phf/plex_sending_...
There has never been any resource record for any sentry.io domain in the DNS that is used by computers I control. This DNS is local and I control it. I saw a request to an ingest.sentry.io domain once while experimenting with Firefox. It failed
The DNS used by me only contains addresses for servers that I find useful
But every user has their own preferences. It is possible that some end-users might see value in allowing their computers to automatically send requests to sentry.io while receiving nothing in return. I am not one of those users
by alimoeeny on 2/5/26, 6:39 PM
by ashu1461 on 2/5/26, 8:16 AM
Internal hostnames leaking is real, but in practice it’s just one tiny slice of a much larger problem: names and metadata leak everywhere - logs, traces, code, monitoring tools etc etc.
by trjordan on 2/5/26, 3:09 PM
Once they know what hosts you run, it'll ping that hostname periodically. If it stays up and stable for a couple days, you'll get an alert in product: "Set up uptime monitoring on <hostname>?"
Whether you think this is valid, useful, acceptable, etc. is left as an exercise to the reader.
by superkuh on 2/5/26, 3:07 PM
by that_guy_iain on 2/5/26, 7:13 AM
by teekert on 2/5/26, 6:52 AM
If Firefox also leaks this, I wonder if this is something mass-surveillance related.
(Judging from the down votes I misunderstood something)
by fragmede on 2/5/26, 6:05 AM
by zaptheimpaler on 2/5/26, 7:26 AM
by stingraycharles on 2/5/26, 5:57 AM
I agree the web UI should never be monitored using sentry. I can see why they would want it, but at the very least should be opt in.
by m3047 on 2/5/26, 6:06 PM
This is the problem with the notion that "in the name of securitah IoT devices should phone home for updates": nobody said "...and map my network in the name of security"
[0] Don't confuse this with Rachel's honeypot wildcarding *.nothing-special.whatever.example.com for external use.
by notpushkin on 2/5/26, 12:44 PM
by NitpickLawyer on 2/5/26, 6:08 AM
by linhns on 2/5/26, 4:38 PM
by ck2 on 2/5/26, 3:04 PM
create an impossible internal hostname and watch for it to come back to you
you don't even need a real TLD if I am not mistaken, use .ZZZ etc
by ranger_danger on 2/5/26, 5:46 AM
by cwillu on 2/5/26, 1:00 PM
by HocusLocus on 2/5/26, 7:10 PM
I've been chosen!
Eeeeeeeeeah!
by rcakebread on 2/5/26, 3:17 PM
by dcrazy on 2/5/26, 5:49 AM
by rini17 on 2/5/26, 12:56 PM
That the nas server incl. hostname is public does not bother me then.
by renewiltord on 2/5/26, 7:57 AM