Hacker News with Generative AI: Network Security

D-Link won't fix critical flaw affecting 60k older NAS devices (bleepingcomputer.com)
More than 60,000 D-Link network-attached storage devices that have reached end-of-life are vulnerable to a command injection vulnerability with a publicly available exploit.
Mitigating IP spoofing against Tor (torproject.org)
At the end of October, Tor directory authorities, relay operators, and even the Tor Project sysadmin team received multiple abuse complaints from their providers about port scanning. These complaints were traced back to a coordinated IP spoofing attack, where an attacker spoofed non-exit relays and other Tor-related IPs to trigger abuse reports aimed at disrupting the Tor Project and the Tor network.
How to inspect TLS encrypted traffic (apnic.net)
Do you want to analyse decrypted TLS traffic in Wireshark or let an Intrusion Detection System (IDS), like Suricata, Snort or Zeek, inspect the application layer data of potentially malicious TLS encrypted traffic?
Ask HN: What ist your AdBlock strategy? (ycombinator.com)
Hi, Just installed OpenWRT. Which solutions for ad blocking and other trackers would you recommend?
Top Cloudflare Tunnel Alternatives in 2024 (pinggy.io)
Cloudflare Tunnel provides a seamless way to connect applications and services to the Cloudflare infrastructure without needing a public IP address. While it’s a powerful tool, several alternatives offer similar capabilities with unique features and benefits. In this article, we’ll explore the top 10 Cloudflare Tunnel alternatives in 2024, covering their Pros, Cons,Uses, Installation process, and pricing to help you find the best solution for your needs.
Dito – an advanced Layer 7 reverse proxy server written in Go (github.com/andrearaponi)
Dito is an advanced Layer 7 reverse proxy server written in Go.
IPv6 Secure Neighbor Discovery (wikipedia.org)
The Secure Neighbor Discovery (SEND) protocol is a security extension of the Neighbor Discovery Protocol (NDP) in IPv6 defined in RFC 3971 and updated by RFC 6494.
The fix for BGP's weaknesses has big issues of its own, boffins find (theregister.com)
The Resource Public Key Infrastructure (RPKI) protocol has "software vulnerabilities, inconsistent specifications, and operational challenges" according to a pre-press paper from a trio of German researchers.
Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack (cloudflare.com)
Cloudflare's DDoS protection systems have been combating a month-long campaign of hyper-volumetric L3/4 DDoS attacks.
Ping Storms at GreyNoise (darthnull.org)
Earlier this month, I attended BSidesNoVA in Arlington, where the keynote was presented by Andrew Morris of GreyNoise. Using sensors distributed all over the world, GreyNoise collects…background noise…on the Internet.
Network Traffic Analysis of ICMP "Love" Noise Storms (darthnull.org)
Earlier this month, I attended BSidesNoVA in Arlington, where the keynote was Andrew Morris of GreyNoise. Using sensors distributed all over the world, GreyNoise collects…background noise…on the Internet. Basically, they watch and monitor activity that hits lots of hosts randomly – network mapping, port scanning, doorknob rattling. If you see someone trying to break into your SSH server, you can check GreyNoise to see if that person (well, their IP, anyway) has been seen doing such things in the past.
WiFi suspended at big UK train stations after 'cybersecurity incident' (theguardian.com)
Wifi networks at a number of train stations across the UK have been suspended after a “cybersecurity incident”.
Excel spreadsheet caused network equipment's physical failure (twitter.com)
Notes and Receipts (PCAPs) for TCP and ICMP Noise Storms (github.com/GreyNoise-Intelligence)
Notes and receipts (PCAPs) for TCP and ICMP Noise Storms
Cloudflare misidentifies Hetzner IPs as being located in Iran (gitlab.com)
We've recently (2-3 weeks?) started experiencing high failure rates in our CI build jobs https://gitlab.com/prpl-foundation/prplos/feed-prpl/-/jobs?statuses=FAILED and subjectively it seems, that it's getting worse each week, there is one such example https://gitlab.com/prpl-foundation/prplos/feed-prpl/-/jobs/3418282471.
Defend against vampires with 10 gbps network encryption (synacktiv.com)
Discover how attackers can sniff your data on network cables and how you can defend against it, by encrypting on-the-fly all your ethernet traffic with very good performance.
TUI for sniffing network traffic using eBPF on Linux (github.com/pythops)
🕵️‍♂️ TUI for sniffing network traffic using eBPF on Linux
Check for malicious IPs using DNS (ipshield.dev)
NetAlertX: Detect Intruders on Your WiFi/LAN Instantly (github.com/jokob-sk)
The Night Watch (2013) [pdf] (usenix.org)
OpenSnitch is a GNU/Linux interactive application firewall (github.com/evilsocket)
0.0.0.0 Day: Exploiting Localhost APIs from the Browser (oligo.security)
Show HN: Lacakgrak – Simple inbound/outbound packet sniffer (github.com/altilunium)
Offload-friendly network encryption in the kernel (lwn.net)
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere (arstechnica.com)
Radius/UDP. How legacy protocols need to keep up with modern cryptography (cloudflare.com)
Inspect TLS encrypted traffic using mitmproxy and Wireshark (koyeb.com)
Why Use Onion Layering? (garrettdbates.com)
Cloudflare 1.1.1.1 incident on June 27, 2024 (cloudflare.com)
BeyondCorp (2014) (research.google)