![]() |
|
![]() |
|
> simply SSH'd over to my on-prem development machine I use mosh and gnu screen for flaky connections. Works wonders even if you disconnect every 10 seconds. |
![]() |
|
Further, security of a marketing site tends to be lower priority than the product itself, and an install script should generally be secured similar to the product.
|
![]() |
|
Brings to mind if there's a service that will monitor all the certs and their expiry. Cloudflare seems to handle a fair bit of this if you host your domain with them, but you have to use Cloudflare. |
![]() |
|
Couple years ago there was an outage at Cloudflare and their www.cloudflare.com started pointing to an unrelated 3rd party marketing website, while the dash.cloudflare.com was showing the dashboard.
|
![]() |
|
Have you contacted them about custom pricing? “Im not going to use most of your features, can I have 75% off” isn’t as outlandish as it sounds. Willing to bet they would bite. |
![]() |
|
> colleagues of mine could not successfully host headscale themselves it’d be interesting to know why, I use it frequently at work and it’s worked pretty well so far. |
![]() |
|
I wonder what provider they use for their website. Sounds like a lot of hoops to jump through for IPV6 when just about any other provider has IPv6 support.
|
![]() |
|
Archive.org captured the original text: https://web.archive.org/web/20240221195021/https://github.co... >I apologize for the slow response. We are targeting to land support for IPv6 towards the beginning of next year. We will communicate updates on this issue. Thanks for the patience. So cringey. Why not just post a new post that said "sorry the deadline slipped, no new date available at the moment"? I will strongly recommend _against_ this company solely based on this communication. If this sort of gaslighting is how they handle their public comms, imagine how their support must be run. |
![]() |
|
A TCP proxy discards the user's IP address, unless you use something like the PROXY protocol[1], which then needs to be supported by the target HTTPS server. You would also need a way to prevent unauthorized users from injecting their own PROXY header. This isn't a problem if you don't need the user's IP address at all, but it's often useful for logging and abuse detection. [1] https://www.haproxy.org/download/1.8/doc/proxy-protocol.txt |
![]() |
|
They may have AWS CloudFront CDN in front of it for IPv6.
If you're doing that, you're terminating TLS at CloudFront. I don't believe that's optional.
|
![]() |
|
> That arrangement is deemed a “misconfiguration” by that provider, and we’ve been receiving alerts about it since rolling it out So 90 days of alerts about certs, and then certs fail? |
![]() |
|
I'd probably spend the effort adding ssl expiration to the monitoring system for all the certs in use. Trigger then a month/week whatever before they're due to expire.
|
I still marvel at just how good Tailscale is. I'm a minor user really but I have two sites that I use tailscale to access: a couple of on-prem servers and my AWS production setup.
I can literally work from anywhere - had an issue over the weekend where I was trying to deploy an ECS container but the local wifi was so slow that the deploy kept timing out.
I simply SSH'd over to my on-prem development machine, did a git pull of the latest code and did the deploy from there. All while remaining secure with no open ports at all on my on-prem system and none in AWS. Can even do testing against the production Aurora database without any open ports on it, simply run a tailscale agent in AWS on a nano sized EC2.
Got another developer you need to give access to your network to? Tailscale makes that trivial (as it does revoking them).
Yeah, for that deployment I could just make a GitHub action or something and avoid the perils of terrible internet, but for this I like to do it manually and Tailscale lets me do just that.