this post was submitted on 11 Jan 2026
215 points (99.5% liked)

Selfhosted

57238 readers
468 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

I generated 16 character (upper/lower) subdomain and set up a virtual host for it in Apache, and within an hour was seeing vulnerability scans.

How are folks digging this up? What's the strategy to avoid this?

I am serving it all with a single wildcard SSL cert, if that's relevant.

Thanks

Edit:

  • I am using a single wildcard cert, with no subdomains attached/embedded/however those work
  • I don’t have any subdomains registered with DNS.
  • I attempted dig axfr example.com @ns1.example.com returned zone transfer DENIED

Edit 2: I'm left wondering, is there an apache endpoint that returns all configured virtual hosts?

Edit 3: I'm going to go through this hardening guide and try against with a new random subdomain https://www.tecmint.com/apache-security-tips/

(page 2) 38 comments
sorted by: hot top controversial new old
[–] TieDyePie@lemmy.world 5 points 1 month ago

If you do a GET / request against the IP (typically http too) does it yield a redirect to your proper fqdn? It shouldn't return anything and remain stealthy as you likely dont want to expose anything directly on IP connections and rely solely on your vhosts.

[–] toebert@piefed.social 4 points 1 month ago

I can't say I know the answer but a few ideas:

  • did you access it with a browser? Maybe it snitches on you or some extension does?
  • did you try to resolve it with a public DNS server at any point (are you sure nothing forwarded the request to one)?

You could try it again, create the domain in the config and then do absolutely nothing. Don't try to confirm it works in any way. If you don't see the same behaviour you can do one of the above and then the other and see when it kicks in. If it gets picked up without you doing anything..then pass!

[–] eli@lemmy.world 4 points 1 month ago* (last edited 1 month ago)

I run my webservers behind a pfsense firewall with ssl offloading(using a wildcard cert) with a static IP and use Haproxy to have sub-domain's go to individual servers. Even though I've seen my fair share of scans, I only ever expose port 443 and keep things updated.

Recently though someone on here mentioned routing everything over Tailscale via a VPS. I didn't want to pay for a VPS and frankly can't even find one that is reasonably priced in the US(bandwidth limits mainly), so I threw Tailscale onto my pfsense, setup split-dns on Tailscale's admin panel with my domain name, and then reconfigured Haproxy to listen on my Tailscale interface. Even got IPv6 working(huge pain due to a bug it seems). Oh and setup pfblocker.

My current plan is I'm going to run my webservers behind Tailscale and keep my game servers public and probably segment those servers to a different vlan/subnet/dmz/whatever. And maybe just have a www/blog landing page that is read only on 443 and have it's config/admin panel accessible via my tailscale only.

Anyway, back on topic. I run my game servers and I don't advertise them out anywhere(wildcard cert) and do whitelist only, yet I still see my minecraft servers get hit constantly on port 25565.

So not much you can do except minimize exposure as much as possible.

[–] Bombastic@sopuli.xyz 4 points 1 month ago (1 children)

Inb4 some lucky dude just ran sublist3r or wfuzz on your subdomain and got a hit

[–] BonkTheAnnoyed@lemmy.blahaj.zone 4 points 1 month ago (1 children)

I mean, it could be... I'll try it with a 128 char base 52 name and see what happens

[–] Keelhaul@sh.itjust.works 4 points 1 month ago (1 children)

Have you also tried making a subdomain and not making any requests to it yourself? So no browser access or other DNS resolution requests for the new subdomain. That should rule out some of the other possible causes suggested in the other comments.

[–] Morphit@feddit.uk 1 points 1 month ago* (last edited 1 month ago)

Dang, it could be the upstream DNS server passing along client queries. Maybe the ISP?

In that case not even curl would be safe unless you could ensure all queries only resolve on your gear. Either use a host file entry or local DNS server.

[–] Morphit@feddit.uk 4 points 1 month ago (1 children)

Have you sent the URL across any messaging services? Lots of them look up links you share to see if it's malware (and maybe also to shovel into their AI). Even email services do this.

load more comments (1 replies)
[–] savvywolf@pawb.social 3 points 1 month ago (1 children)

If you do a port scan on your box, what services are running? Maybe something like email or diagnostics is exposed to the internet and announcing subdomains?

It's literally just a VM hosting Apache and nothing else.

[–] FukOui@lemmy.zip 3 points 1 month ago* (last edited 1 month ago)

Following this thread!

Stupid question, but are you somehow publicly exposing your vhost config (or a bak file of it)? Or do you see logs of someone bruteforcing the subdomain?

[–] BootLoop@sh.itjust.works 2 points 1 month ago (1 children)

Did you generate a DNS A record for the subdomain?

[–] waggz@programming.dev 1 points 1 month ago (1 children)

if there's no dns entry do you mean you are getting scans to your ip with these random subdomain headers? so someone would need both pieces of information? curious

Yes, exactly. Super weird, shouldn't happen. I wonder if I have a compromised box somewhere...

load more comments
view more: ‹ prev next ›