When internal hostnames are leaked to the clown

Accessing the blog & blocking behavior

  • Several commenters report the blog being very slow or tar-pitted, especially via Apple Private Relay, some ISPs, and VPNs; oddly, Tor often works.
  • Others note the author has long blocked or throttled “bad” RSS clients, with some readers unsubscribing because the blocking felt over‑aggressive.

How the internal hostname leaked

  • Core interpretation: the NAS web UI includes Sentry JavaScript; the browser sends error/trace data (including the internal hostname) to sentry.io.
  • Sentry then appears to initiate TLS connections back to that hostname (for things like uptime checks, source maps, or icons), which are caught by a wildcard DNS/HTTPS “honeypot” the author set up.
  • Multiple commenters stress this is not a Certificate Transparency (CT) leak in this case, because only a wildcard cert was issued, not a cert for nas.….

Certificate Transparency, Let’s Encrypt & exposure

  • Some initially blame Let’s Encrypt/CT for making hostnames visible and attracting automated scanners (e.g., Heroku examples).
  • Others clarify that CT logging is effectively required for all public CAs, not specific to Let’s Encrypt, and wildcard certs only reveal *.example.com, not specific subdomains.
  • There’s anecdotal disagreement on whether LE‑issued domains are probed more than paid‑cert domains.

Severity of hostname leakage

  • One camp: internal hostnames can reveal sensitive metadata (e.g., merger names) and help attackers map internal networks; this is worth worrying about at high security levels.
  • Another camp: hostnames are inherently leaky (DNS, logs, emails, resolvers selling query data), so you should never rely on hostname secrecy; don’t put secrets in hostnames at all.
  • Suggested pattern: keep hostnames generic and put any “unguessable” part in the URL path instead.

Telemetry, Sentry, and browser-side tracking

  • Many see embedding Sentry in a “local appliance” web UI as an unacceptable, non-obvious privacy violation, especially on supposedly isolated LANs.
  • Others argue that once you give a device an IP stack and a browser-based UI, you shouldn’t be surprised if it phones home; vendors use third‑party telemetry to debug and prioritize features.
  • Some confusion initially blamed browsers or “mass surveillance,” later clarified as application-level JS behavior.

Defensive techniques

  • Common mitigations mentioned: uBlock Origin, Privacy Badger, router‑level blockers like AdGuard Home or Pi‑hole, DNS RPZ, Little Snitch, and injecting strict CSP and Referrer-Policy headers via a reverse proxy (e.g., Nginx) in front of appliances.
  • A few suggest honeypot hostnames or wildcard DNS to detect unexpected leaks.

NAS device choices and design philosophy

  • Mixed views on commercial NASes (especially Synology): some praise their stability when used purely as file servers; others dislike proprietary stacks, outdated kernels, phoning home, and difficulty with custom TLS.
  • Several advocate DIY Linux/TrueNAS-style boxes for control and transparency, while noting tradeoffs like power usage and extra setup effort.