Most active commenters
  • donmcronald(3)

←back to thread

742 points janpio | 13 comments | | HN request time: 0.724s | source | bottom
1. Animats ◴[] No.45676471[source]
If you block those internal subdomains from search with robots.txt, does Google still whine?
replies(2): >>45676712 #>>45677686 #
2. snailmailman ◴[] No.45676712[source]
I’ve heard anecdotes of people using an entirely internal domain like “plex.example.com” even if it’s never exposed to the public internet, google might flag it as impersonating plex. Google will sometimes block it based only on name, if they think the name is impersonating another service.

Its unclear exactly what conditions cause a site to get blocked by safe browsing. My nextcloud.something.tld domain has never been flagged, but I’ve seen support threads of other people having issues and the domain name is the best guess.

replies(1): >>45676809 #
3. donmcronald ◴[] No.45676809[source]
I'm almost positive GMail scanning messages is one cause. My domain got put on the list for a URL that would have been unknowable to anyone but GMail and my sister who I invited to a shared Immich album. It was a URL like this that got emailed directly to 1 person:

https://photos.example.com/albums/xxxxxxxx-xxxx-xxxx-xxxx-xx...

Then suddenly the domain is banned even though there was never a way to discover that URL besides GMail scanning messages. In my case, the server is public so my siblings can access it, but there's nothing stopping Google from banning domains for internal sites that show up in emails they wrongly classify as phishing.

Think of how Google and Microsoft destroyed self hosted email with their spam filters. Now imagine that happening to all self hosted services via abuse of the safe browsing block lists.

replies(6): >>45676948 #>>45676999 #>>45677030 #>>45677045 #>>45677050 #>>45677845 #
4. ◴[] No.45676948{3}[source]
5. beala ◴[] No.45676999{3}[source]
It doesn’t seem like email scanning is necessary to explain this. It appears that simply having a “bad” subdomain can trigger this. Obviously this heuristic isn’t working well, but you can see the naive logic of it: anything with the subdomain “apple” might be trying to impersonate Apple, so let’s flag it. This has happened to me on internal domains on my home network that I've exposed to no one. This also has been reported at the jellyfin project: https://github.com/jellyfin/jellyfin-web/issues/4076
replies(1): >>45678694 #
6. im3w1l ◴[] No.45677030{3}[source]
Chrome sends visited urls to Google (ymmv depending on settings and consents you have given)
7. r_lee ◴[] No.45677045{3}[source]
if it was just the domain, remember that there is a Cert Transparency log for all TLS certs issued nowadays by valid CAs, which is probably what Google is also using to discover new active domains
8. EdwardKrayer ◴[] No.45677050{3}[source]
Well, that's potentially horrifying. I would love for someone to attempt this in as controlled of a manner as possible. I would assume it's possible for anyone using Google DNS servers to also trigger some type of metadata inspection resulting in this type of situation as well.

Also - when you say banned, you're speaking of the "red screen of death" right? Not a broader ban from the domain using Google Workplace services, yeah?

replies(1): >>45679064 #
9. david_van_loon ◴[] No.45677686[source]
Yes, my family Immich instance is blocked from indexing both via headers and robots.txt, yet it's still flagged by Google as dangerous.
replies(1): >>45678854 #
10. liqilin1567 ◴[] No.45677845{3}[source]
This reminds me of another post where a scammer sent a gmail message containing https://site.google.com/xxx link to trick users into click, but gmail didn't detect the risk.
11. donmcronald ◴[] No.45678694{4}[source]
In my case though, the Google Search Console explicitly listed the exact URL for a newly created shared folder as the cause.

https://photos.example.com/albums/xxxxxxxx-xxxx-xxxx-xxxx-xx...

That's not going to be gleaned from a CT log or guessed randomly. The URL was only transmitted once to one person via e-mail. The sending was done via MXRoute and the recipient was using GMail (legacy Workspace).

The only possible way for Google to have gotten that URL to start the process would have been by scanning the recipient's e-mail.

12. jeroenhd ◴[] No.45678854[source]
I'm kind of curious, do you have your own domain for immich or is this part of a malware-flagged subdomain issue? It's kind of wild to me that Google would flag all instances of a particular piece of self-hosted software as malicious.
13. donmcronald ◴[] No.45679064{4}[source]
> Also - when you say banned, you're speaking of the "red screen of death" right?

Yes.

> I would love for someone to attempt this in as controlled of a manner as possible.

I'm pretty confident they scanned a URL in GMail to trigger the blocking of my domain. If they've done something as stupid as tying GMail phishing detection heuristics into the safe browsing block list, you might be able to generate a bunch of phishy looking emails with direct links to someone's login page to trigger the "red screen of death".