<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: JohnLeitch</title><link>https://news.ycombinator.com/user?id=JohnLeitch</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 23:28:57 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=JohnLeitch" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by JohnLeitch in "How to choose colors for your CLI applications (2023)"]]></title><description><![CDATA[
<p>> refrain from setting background colors<p>That's the thing though, setting bg color opens up a lot of options, and constraining to invert is not sufficient in my opinion.</p>
]]></description><pubDate>Thu, 29 Jan 2026 17:57:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=46813789</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46813789</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46813789</guid></item><item><title><![CDATA[New comment by JohnLeitch in "OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing"]]></title><description><![CDATA[
<p>Ah, okay. Thought you were talking about OOB heap write or something.</p>
]]></description><pubDate>Tue, 27 Jan 2026 19:14:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=46784859</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46784859</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46784859</guid></item><item><title><![CDATA[New comment by JohnLeitch in "OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing"]]></title><description><![CDATA[
<p>> though this would be a much more sophisticated exploit and is maybe a bit of a reach.<p>Not necessarily. I have successfully exploited stack buffer overflows in major products despite stack canaries, ASLR, and DEP. It largely depends on context; if the vector is something that can be hit repeatedly, such a webform that that takes a cert or whatever, that simplifies things a lot versus something like a file format exploit, where you probably only get one chance. While I haven't analyzed this vulnerability, I would absolutely assume exploitability even if I couldn't see a way myself.</p>
]]></description><pubDate>Tue, 27 Jan 2026 19:10:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46784776</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46784776</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46784776</guid></item><item><title><![CDATA[New comment by JohnLeitch in "OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing"]]></title><description><![CDATA[
<p>It depends on what mitigations are in place and the arrangement of the stack. Even with stack canaries, having an unfortunate value on the stack e.g. a function pointer can still be quite dangerous if it can be overwritten without hitting any of the stack canaries.</p>
]]></description><pubDate>Tue, 27 Jan 2026 19:02:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46784664</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46784664</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46784664</guid></item><item><title><![CDATA[New comment by JohnLeitch in "OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing"]]></title><description><![CDATA[
<p>Assuming you're talking about a heap buffer overrun, it's still possible to exploit for EoP in some cases.</p>
]]></description><pubDate>Tue, 27 Jan 2026 18:59:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46784603</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46784603</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46784603</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Poland's energy grid was targeted by never-before-seen wiper malware"]]></title><description><![CDATA[
<p>While there's some overlap in methodologies and back-and-forth with various escalations, so-called malware is distinct from software exploits. Malware can be delivered without an exploit and quite often is. Social engineering is highly effective.</p>
]]></description><pubDate>Sun, 25 Jan 2026 06:43:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46751417</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46751417</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46751417</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Second Win11 emergency out of band update to address disastrous Patch Tuesday"]]></title><description><![CDATA[
<p>I was hit by this. Could RDP into machines using the regular client, but could not access Dev Boxes via Windows App. Getting real sick of the low quality AI slop.</p>
]]></description><pubDate>Sun, 25 Jan 2026 05:19:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=46750989</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46750989</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46750989</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Nvidia-smi hangs indefinitely after ~66 days"]]></title><description><![CDATA[
<p>Seems quite predictable given the others in the bug report encountering the same.</p>
]]></description><pubDate>Sun, 25 Jan 2026 05:17:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=46750979</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46750979</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46750979</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>For sure. When it's out I'll give it a go.</p>
]]></description><pubDate>Fri, 23 Jan 2026 23:42:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46739497</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46739497</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46739497</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>Thanks for taking the time to respond, and apologies for the contentiousness. I'm a jaded old man suffering from severe LLM fatigue, so I may have come off a bit harsh. Your write-up was a good read, and while I might be critical of your methodology, what you did clearly worked, and that's what matters in the end. Best of luck with your project, especially the go lib fork.</p>
]]></description><pubDate>Fri, 23 Jan 2026 22:14:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=46738696</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46738696</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46738696</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>The problem is hallucinations. It's incredibly frustrating to have an LLM describe an API or piece of functionality that fulfills all requirements perfectly, only to find it was a hallucination. They are impressive sometimes though. Recently I had an issue with a regression in some of our test capabilities after a pivot to Microsoft Orleans. After trying everything I could think of, I asked Sonnet 4.5, and it came up with a solution to a problem I could not even find described on the internet, let alone solved. That was quite impressive, but I almost gave up on it because it hallucinated wildly before and after the workable solution.<p>The same stuff happens when summarizing documentation. In that regard, I would say that, at best, modern LLMs are only good for finding an entrypoint into the docs.</p>
]]></description><pubDate>Fri, 23 Jan 2026 18:44:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=46736108</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46736108</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46736108</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>Oh come on, the fact that the author was able to pull this off is surely indicative of some expertise. If the story started had started off with, "I asked the LLM how to capture network traffic," then yeah, what I said would not be applicable. But that's not how this was presented. tcpdump was used, profiling tools were mentioned, etc. It is not a stretch to expect somebody who develops networked applications knows a thing or two about protocol analysis.</p>
]]></description><pubDate>Fri, 23 Jan 2026 18:38:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46736037</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46736037</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46736037</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>Sure, but that is aside from my original point. If somebody:<p>a) Has the knowledge to run tcpdump or similar from the command line<p>b) Has the ambition to document and publish their effort on the internet<p>c) Has the ability identify and patch the target behaviors in code<p>I argue that, had they not run to an LLM, they likely would have solved this problem more efficiently, and would have learned more along the way. Forgive me for being so critical, but the LLM use here simply comes off as lazy. And not lazy in a good efficiency amplifying way, but lazy in a sloppy way. Ultimately this person achieved their goal, but this is a pattern I am seeing on a daily basis at this point, and I worry that heavy LLM users will see their skill sets stagnate and likely atrophy.</p>
]]></description><pubDate>Fri, 23 Jan 2026 03:36:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=46728100</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46728100</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46728100</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>>Is that because wireshark can't do that just from packet captures?<p>Well, not quite. I think it's more that nobody has taken the time to implement it. That's not to say such an implementation would automatically decrypt the traffic from a capture with no extra leg work, of course. Wireshark dissectors have user configurable preferences, and presumably this would be where captured secrets could be set for use. This is how it handles TLS decryption [1], which works beautifully.<p>[1] <a href="https://wiki.wireshark.org/TLS#tls-decryption" rel="nofollow">https://wiki.wireshark.org/TLS#tls-decryption</a></p>
]]></description><pubDate>Fri, 23 Jan 2026 03:27:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=46728024</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46728024</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46728024</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>What are you even trying to say? I suppose I'll clarify for you: Yes, I'm confident I could have identified the cause of the mysterious packets quickly. No, I'm not going to go through the motions because I have no particular inclination toward the work outside of banter on the internet. And what's more, it would be contrived since the answer has already shared.</p>
]]></description><pubDate>Fri, 23 Jan 2026 00:03:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=46726728</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46726728</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46726728</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>Not even remotely accurate. While the dissector is not as mature as I thought and there's no built-in decryption as there is for TLS, that doesn't matter much. Hint: every component of the system is attacker controlled in this scenario.</p>
]]></description><pubDate>Thu, 22 Jan 2026 22:42:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46726078</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46726078</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46726078</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>Well, I spent a good part of my career reverse engineering network protocols for the purpose of developing exploits against closed source software, so I'm pretty sure I could do this quickly. Not that it matters unless you're going to pay me.</p>
]]></description><pubDate>Thu, 22 Jan 2026 22:39:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=46726049</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46726049</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46726049</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>What I suggested (mistakenly so, see my revised suggested approach in response to one of your siblings) is the exact opposite of gate keeping.</p>
]]></description><pubDate>Thu, 22 Jan 2026 22:37:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=46726031</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46726031</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46726031</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>Interesting, I thought it was possible to decrypt SSH in Wireshark a la TLS, but it seems I'm mistaken. It still would have been my first goto, likely with encryption patched out as you stated. With well documented protocols, it's generally not too difficult deciphering the raw interior bits as needed with the orientation provided by the dissected pieces. So let me revise my statement: this probably would have been a fairly easy task with protocol analysis guided code review (or simply CR alone).</p>
]]></description><pubDate>Thu, 22 Jan 2026 22:34:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=46726009</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46726009</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46726009</guid></item><item><title><![CDATA[New comment by JohnLeitch in "Why does SSH send 100 packets per keystroke?"]]></title><description><![CDATA[
<p>The reliance on LLMs is unfortunate. I bet this mystery could gave been solved much quicker by simply looking at the packet capture in Wireshark. The Wireshark dissectors are quite mature, SSH is covered fairly well.</p>
]]></description><pubDate>Thu, 22 Jan 2026 21:25:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=46725309</link><dc:creator>JohnLeitch</dc:creator><comments>https://news.ycombinator.com/item?id=46725309</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46725309</guid></item></channel></rss>