• Hot Saucerman@lemmy.ml
    link
    fedilink
    English
    arrow-up
    79
    arrow-down
    3
    ·
    edit-2
    1 year ago

    EDIT: OP has informed me it is not their personal IP. All is good in the land of Lemmy.


    Must have quite a personal network for it to be a Class A address with 131072 subnets and 126 hosts. /s

    Also, probably not a good idea to make memes with your real IP.

    • ɐɥO@lemmy.ohaa.xyz
      link
      fedilink
      arrow-up
      23
      ·
      1 year ago

      Dont really see a problem with leaking ip adresses. You can get mine by doing a nslookup on my lemmy domain for example

      • Hot Saucerman@lemmy.ml
        link
        fedilink
        English
        arrow-up
        30
        arrow-down
        1
        ·
        edit-2
        1 year ago

        It’s like putting your phone number on the wall of a bathroom stall. Maybe you won’t get a lot of prank calls, maybe you will. It’s a crapshoot.

        The thing is, posting your public IP is like asking for a number of hackers to start probing your network for lapses in security. Not because you’re a juicy target, but simply because you put the information out there. That’s been bog standard for the internet for 20 years now.

        Sure, IP addresses can be found through various ways, but having them out for everybody to see is just asking for more trouble than it is worth. You’re making yourself a target and creating more work for yourself if you’re constantly getting hacked because of it.

        Like I don’t even want to do anything malicious and I immediately started up a traceroute.

        • andrew@lemmy.stuart.fun
          link
          fedilink
          English
          arrow-up
          20
          ·
          1 year ago

          A trip to shodan should be enough to convince you that ipv4 space is small enough that it really doesn’t buy you much to hide anything. Maybe a tiny bit of extra privacy by not associating an identity to an IP, but even that is pretty quickly blown away if you host anything identifiable. Which is the small web we’d benefit from restoring anyway.

          • Hot Saucerman@lemmy.ml
            link
            fedilink
            English
            arrow-up
            17
            ·
            edit-2
            1 year ago

            The difference is a random IP is a random IP. You don’t know who it’s connected to. Once someone says “This is my IP” you now have it connected to a specific person, and other specific people may want to fuck with the original person.

            Bots already scan all open IP addresses for vulnerabilities, but hackers live for people who give up information for free because fucking with someone who thinks they’re safe from it all is fun to them apparently.

            • andrew@lemmy.stuart.fun
              link
              fedilink
              English
              arrow-up
              5
              ·
              1 year ago

              Right, that’s the privacy aspect I mentioned. PII tied to your IP is now available, even if it’s just a pseudoidentity. But hosting anything also likely throws that out the window in the same way. Unless you have more users on your hosted service, but even then it narrows things down.

          • Hot Saucerman@lemmy.ml
            link
            fedilink
            English
            arrow-up
            5
            ·
            1 year ago

            So just put your phone number on the front page of Lemmy. Or are you practicing security through obscurity by not releasing it? /s

            It’s not security through obscurity to not divulge information that need not be divulged. It’s not obscure if there’s lots of ways to find an IP. Like I said, it’s like putting a phone number out there. Like that one guy from 10 years ago who posted his phone number online and immediately regretted it because his phone just wouldn’t stop ringing. He wasn’t “afraid” until it totally fucked up his ability to use his phone. I’m just trying to be helpful. If you really want to put yourself on blast, go for it man.

          • bamboo@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 year ago

            There are some things you can’t hide for the internet to work, such as IP addresses, so an IP address on it’s own is not privileged information. Announcing to the world that “this is my IP address” adds information and context which from a privacy perspective is privileged. If someone has an issue with you, they might target their focus to seeing if there’s a service running which is vulnerable at your IP, or they could initiate a DDoS against you.

          • pjhenry1216@kbin.social
            link
            fedilink
            arrow-up
            3
            ·
            1 year ago

            If it’s your only layer of security, it’s not good. But when a website doesn’t tell you whether or not an email account exists when you try a username and password, it’s still obscurity (you’re not confirming one way or the other) but it’s still a useful level of security. IPs are generally not given out for a reason. Most people don’t even realize they don’t get hacked simply because they aren’t targeted. That you even route local traffic via the internet is interesting to begin with and makes me wonder if you truly are prepared for a targeted attack. Maybe you decided it’s not worth the effort but maybe you don’t know how. I don’t know. But nonetheless, you’re making yourself more of a target.

    • Illecors@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      12
      ·
      1 year ago

      Depends. If the zone responsible for whatever resolves to that IP is hosted locally - then DNS request would stay local.

      If the service behind that IP is running locally - then all traffic would stay local. Network stack would be smart enough to not run circles to find itself.

      • Natanael@slrpnk.net
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        Yeah, the router ought to know that public IP belongs to a device in its own network unless you’re doing stuff like running your own router behind an ISP provided router and just forwarding ports instead of maintaining IP assignment / routing tables

    • AnActOfCreation@programming.dev
      link
      fedilink
      arrow-up
      12
      ·
      1 year ago

      If the router supports hairpinning, the IP request can be resolved locally.

      The domain name lookup would be a different issue and could potentially need to be resolved externally, but the router’s DNS cache should be able to answer eventually.

    • Chreutz@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      1 year ago

      The client will look up your domain at whatever DNS it uses. It will return your public IP.

      Client will send a packet with that as destination. It will reach the router which goes ‘I know! The call is coming from inside the house!’ and sends it to the server without modification.

      The server gets it and sends a response, but the response is addressed back to client’s local IP.

      Client gets the response, but that packet’s origin (in the header) is server’s local IP.

      Client goes ‘wtf, I didn’t call you?!’ And drops the packet, still waiting for a response with your public IP as its origin.

      This can be solved with the router modifying the appropriate traffic’s headers so that the headers match the expected, called NAT Loopback, or by using IPv6 global addresses.

      It might also work running a local DNS server that returns your server’s local IP for a given domain, but that might yield certificate errors, and won’t work if devices ignore the DNS coming from DHCP.

      I was using straight firewall rules for some years, but lost the template when the NAT Loopback checkbox started working (OpenWRT).

    • atocci@kbin.social
      link
      fedilink
      arrow-up
      5
      ·
      1 year ago

      Hey same I don’t know why it doesn’t work. I need to use my server’s local IP when I connect from inside my house.

    • whiskyjack@lemmy.ca
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      1 year ago

      Couple good ideas already posted, but also you can update your hosts file with a ref to the internal IP, or if you are running your own DNS server, add an override for the domain

    • tsuica@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      There’s a few devices out there that don’t offer NAT hairpin/loopback by default, such as Mikrotik.

    • pjhenry1216@kbin.social
      link
      fedilink
      arrow-up
      9
      ·
      edit-2
      1 year ago

      It’s not internal, but there are other private address ranges beyond 192.168.0.0/16. 10.0.0.0/8 is another common one. Container platforms like to use 172.16.0.0/12.

    • bamboo@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      1 year ago

      It’s a public IPv4 address in the picture.

      There are 3 ranges of IPv4 addresses which are reserved for private use:

      24-bit block 10.0.0.0 – 10.255.255.255 20-bit block 172.16.0.0 – 172.31.255.255 16-bit block 192.168.0.0 – 192.168.255.255

      • UraniumBlazer@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        Oh wow… Didn’t know this lol. I thought that OP would be using their private IP to access their homserver from home. Turns out I got completely confused…

        • AnActOfCreation@programming.dev
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          I think if they were using a private IP, there wouldn’t really be a joke. Of course the router can resolve an IP in its network. The joke is that they’re using their public IP from inside their network, and when the request gets the router, instead of resolving externally, it resolves to the public IP of the router itself.