←back to thread

706 points janpio | 4 comments | | HN request time: 1.007s | source
Show context
arccy ◴[] No.45676475[source]
If you're going to host user content on subdomains, then you should probably have your site on the Public Suffix List https://publicsuffix.org/list/ . That should eventually make its way into various services so they know that a tainted subdomain doesn't taint the entire site....
replies(15): >>45676781 #>>45676818 #>>45677023 #>>45677080 #>>45677130 #>>45677226 #>>45677274 #>>45677297 #>>45677341 #>>45677379 #>>45677725 #>>45677758 #>>45678975 #>>45679154 #>>45679258 #
LennyHenrysNuts ◴[] No.45677274[source]
The root cause is bad behaviour by google. This is merely a workaround.
replies(1): >>45677284 #
bitpush ◴[] No.45677284[source]
Remember, this is a free service that Google is offering for even their competitors to use.

And it is incredibly valuable thing. You might not think it is, but internet is filled utterly dangerous, scammy, phisy, malwary websites and everyday Safe Browsing (via Chrome, Firefox and Safari - yes, Safari uses Safe Browsing) keeps users safe.

If immich didnt follow best practice that's Google's fault? You're showing your naivety, and bias here.

replies(6): >>45677317 #>>45677323 #>>45677395 #>>45678677 #>>45678682 #>>45679318 #
NetMageSCW ◴[] No.45677323[source]
Please point me to where GoDaddy or any other hosting site mentions public suffix, or where Apple or Google or Mozilla have a listing hosting best practices that include avoiding false positives by Safe Browsing…
replies(1): >>45677462 #
1. gruez ◴[] No.45677462[source]
>GoDaddy or any other hosting site mentions public suffix

They don't need to mention it because they handle it on behalf of the client. Them recommending best practices like using separate domains makes as much sense as them recommending what TLS configs to use.

>or where Apple or Google or Mozilla have a listing hosting best practices that include avoiding false positives by Safe Browsing…

Since were those sites the go to place to learn how to host a site? Apple doesn't offer anything related to web hosting besides "a computer that can run nginx". Google might be the place to ask if you were your aunt and "google" means "internet" to her. Mozilla is the most plausible one because they host MDN, but hosting documentation on HTML/CSS/JS doesn't necessarily mean they offer hosting advice, any more than expecting docs.djangoproject.com to contain hosting advice.

replies(1): >>45677700 #
2. Zak ◴[] No.45677700[source]
The underlying question is how are people supposed to know about this before they have a big problem?
replies(1): >>45677757 #
3. nemothekid ◴[] No.45677757[source]
If you have a service where anyone can sign up and host content on your subdomain, it really is your responsibility to know. Calling this "unfair" because you didn't know is naive.

If amazon shutdown your AWS account, because those same scammers used those domains to host CP rather than phishing pages, would you accept the excuse of "how was I supposed to know?"

replies(1): >>45678880 #
4. asmor ◴[] No.45678880{3}[source]
Nothing in this article indicates UGC is the problem. It's that Google thinks there's an "official" central immich and these instances are impersonating it.

What malicious UGC would you even deliver over this domain? An image with scam instructiins? CSAM isn't even in scope for Safe Browsing, just phishing and malware.