Matt Nordhoff

He/him. Previously twitter.com/mnordhoff.

Matt Nordhoff boosted:
2025-07-19

the next generation of stalebots

Screenshot of a conversation on github. Someone said "Dosubot, the issue still persists", after which dosubot removed the stale label but closed the issue with the comment: "Thank you for your response! We appreciate your input regarding the issue. Since you mentioned it still persists, we'll go ahead and close this issue for now."
Matt Nordhoff boosted:
2025-07-19

@xtaran @karotte @casandro @GossiTheDog

That's an old one! We came up with it for IPv6 when I was working at Microsoft. I think it was introduced in Windows XP SP1. We were worried that typing addresses like 2001:2:3::abcd was not going to work well in a variety of user interfaces, hence the "2001-2-3--abcd.ipv6-literal.net" hack. One of the team members (maybe me, not sure now) registered it on a personal account, and then transferred ownership to Microsoft before shipping.

2025-07-19

I wish Internet scanners would spontaneously combust but, in the meantime, I wish they would operate more efficiently.

Sending 200 HTTP requests looking for WordPress exploits or variations of "/env" is godawful, and sending DNS queries to a different open resolver for each request so none of them are ever cached is even worse.

* Disclosure: Sometimes the call is coming from inside the house, but still.

2025-07-19

Tailscale recently sent out a notification that they're moving their API at controlplane.tailscale.com, hosted on AWS EC2, to BYOIP addresses. RIP very neat IP 52.28.255.255. I hope they keep it if they have anything to use it for.

Though, really, Amazon has loads of /16s, so there must be other customers with similar IPs.

Edit: Also their control panel at login.tailscale.com/ runs on the same IPs.

Matt Nordhoff boosted:
2025-07-19

@fanf fig 1 in the referenced paper is cool

arxiv.org/pdf/physics/0501149

A 4 by chart of still frames from 4 different liquid drop experiments. the top line, labeled 100kPa shows the drop just touching the surface at 0ms, then the developing corona splash at 0.276ms, then the widening splash as the droplet flattens against the surface at 0.552ms, and finally the surface covered with rippling liquid at 2.484ms.

The subsequent 3 lines show decreasing amount of splash at 38.4 kPa and 30.0kPa, until the 4th line shows no splash at all at 17.2kPa.
Matt Nordhoff boosted:
2025-07-19

liquids don’t splash in a vacuum ?! youtu.be/aXTcYa7u12k

Matt Nordhoff boosted:
2025-07-18

Wake up bae, new attack surface just dropped. Works outside UNC paths too, and MS don’t appear to own the domain 🤣
chaos.social/@karotte/11487531

2025-07-18

If an important DNS company simultaneously does a successful (though non-conservative) algorithm rollover of a customer zone, and completely botches some of their own corporate reverse DNS zones... I don't know whether to be impressed or not.

2025-07-18

Akamai/Linode has been having a bad time since yesterday.

status.linode.com/incidents/wq

They run approximately 2 object storage platforms—an older, lower-capacity one and a newer, higher-capacity one—divided into 4 "endpoint types" based on data center age and cluster size, and the newer platform is... down... with knock-on effects on k8s and some other services.

Matt Nordhoff boosted:
2025-07-17

You may've seen @bagder 's post about mails he gets about CRA compliance from large companies asking him to answer all kinds of questions. I just saw a similar one to the maintainer of another important FOSS library. The kicker: The company uses a version from 2000. (Yes, no typo, 25 years old. I think it has some unfixed vulnerabilities.)

2025-07-17

One of my domain names is expiring next month. It has a subdomain with a DNSSEC key with the tag "40". (Totally random, I didn't do anything.) RIP. :(

(I know I could copy it to another zone, but I don't think I will... maybe...)

Matt Nordhoff boosted:
Aaron Toponce ⚛️:debian:atoponce@fosstodon.org
2025-07-16

@tychotithonus According to the announcement, you could get it from ftp://mhd3.moorhead.msus.edu/pub/linux/slackware at the time.

We need a version of The Unix Heritage Society for Linux.

Matt Nordhoff boosted:
Aaron Toponce ⚛️:debian:atoponce@fosstodon.org
2025-07-16

On July 16, 1993, Patrick Volkerding announced Slackware Linux 1.0 to the comp.os.linux newsgroup.

Unfortunately, it's been lost from the Internet. The beta exists as does 1.0.1, but 1.0 is gone forever.

slackware.com/announce/1.0.php

#slackware #linux

2025-07-16

whalebone.io/aura-infrastructu Wait did Whalebone name their commercial DNS resolver product "Aura Infrastructure" as a marketing hack so it would have the acronym "AI"? :blobthinkingfast:

Matt Nordhoff boosted:
2025-07-16

Unbound 1.23.1 in now available. This security release fixes the Rebirthday Attack CVE-2025-5994.

The vulnerability re-opens up #DNS resolvers to a birthday paradox, for EDNS client subnet servers that respond with non-ECS answers. The #CVE is described here:
nlnetlabs.nl/downloads/unbound

We would like to thank Xiang Li (AOSP Lab, Nankai University) for discovering and responsibly disclosing the vulnerability.
github.com/NLnetLabs/unbound/r

2025-07-16

@hanno I'm 99% sure some 2000s-era Windows had trouble with the apostrophe in the old "Let's Encrypt Authority X3" intermediates.* They really lucked out by avoiding that in the roots.

* More things had trouble with the name constraints...

2025-07-16

blog.cloudflare.com/cloudflare

Summary: Most of 1.1.1.1's IP addresses were accidentally included in the configuration for some new service, thus the routes were withdrawn globally when the service was deployed to a test data center.

Matt Nordhoff boosted:
2025-07-15

Just a quickie from one of our @DomainTools researchers today that I know @cR0w will enjoy.

Malware in DNS - specifically, malware seen being assembled from DNS TXT records.

Not a "zomg new thing!" so much as a neat example in the wild.

#infosec #cybersecurity #DNS

dti.domaintools.com/malware-in

Matt Nordhoff boosted:
Jeff Sikesbox464
2025-07-15

How many parked (unused) domains do you own? I have an idea and want to know if my assumption is correct.

Boost generously, please.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst