<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: hubabuba44</title><link>https://news.ycombinator.com/user?id=hubabuba44</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 00:49:55 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=hubabuba44" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by hubabuba44 in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>Ah nice, I'll take a look at the open source eBPF part for the process resolution which is an area where I still have some rough edges and there is probably something I can learn from your approach.</p>
]]></description><pubDate>Thu, 16 Apr 2026 09:14:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47790587</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=47790587</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47790587</guid></item><item><title><![CDATA[New comment by hubabuba44 in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>Are you referring to rustnet or littlesnitch?</p>
]]></description><pubDate>Thu, 16 Apr 2026 08:59:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47790456</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=47790456</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47790456</guid></item><item><title><![CDATA[New comment by hubabuba44 in "AI Will Be Met with Violence, and Nothing Good Will Come of It"]]></title><description><![CDATA[
<p>I'm genuinely curious why this is flagged?</p>
]]></description><pubDate>Sun, 12 Apr 2026 19:13:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47743277</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=47743277</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47743277</guid></item><item><title><![CDATA[New comment by hubabuba44 in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>I'm happy to see this on Linux and I really appreciate the open-sourcing of the eBPF component.<p>I maintain rustnet, a passive network monitor in the same eBPF + libpcap space, so I ran into a lot of the same issues. Wanted to share what has been working for me on the privilege side, in case any of it is useful for v2.<p>rustnet ships with setcap 'cap_net_raw,cap_bpf,cap_perfmon+eip' instead of setuid-root. During startup it loads the eBPF programs, opens the pcap handle, and then drops all three caps before touching any packet data. It clears the ambient set, sets PR_SET_NO_NEW_PRIVS, and applies a Landlock ruleset that restricts the filesystem to /proc plus configured log paths and blocks TCP bind/connect on 6.4+ kernels. Code is in src/network/platform/linux/sandbox/ if you want to have a look.<p>On the "needs to watch mounts" point, totally fair that Little Snitch needs live mount visibility, but I think it is achievable without staying UID 0:<p>- Watching for mount changes: poll() on /proc/self/mountinfo with POLLPRI wakes on every mount table change from a completely unprivileged process (this is what systemd and mount(8) use internally). Alternatively, an eBPF program on the mount/umount/move_mount tracepoints can be loaded at init and stream events via a ring buffer, with no continued cap cost after load.
- Resolving an arbitrary PID to its binary across container mount namespaces: CAP_SYS_PTRACE is enough for that. The /proc/PID/root magic symlink does the namespace translation inline inside the kernel pathwalk, so open("/proc/12345/root/usr/bin/firefox", ...) opens the right file in the right container's view without ever calling setns(), which is what would otherwise need CAP_SYS_ADMIN (the new root).</p>
]]></description><pubDate>Thu, 09 Apr 2026 15:23:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47704943</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=47704943</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47704943</guid></item><item><title><![CDATA[New comment by hubabuba44 in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>Congrats on the Linux port, this looks very nice.<p>Shameless plug: for anyone who wants something fully open source and terminal-based, I maintain RustNet (<a href="https://github.com/domcyrus/rustnet" rel="nofollow">https://github.com/domcyrus/rustnet</a>). It's a bit different because it's a TUI for real-time connection monitoring with deep packet inspection, not a firewall. No blocking/rules, but it's cross-platform (Linux/macOS/Windows), the entire codebase is open, and it sandboxes itself after init via Landlock with capability dropping.</p>
]]></description><pubDate>Thu, 09 Apr 2026 06:38:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47700067</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=47700067</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47700067</guid></item><item><title><![CDATA[New comment by hubabuba44 in "Show HN: I built a macOS tool for network engineers – it's called NetViews"]]></title><description><![CDATA[
<p>It looks very slick!<p>Cool to see more network tools for macOS.<p>For anyone who does prefer a CLI-based approach, I maintain RustNet <a href="https://github.com/domcyrus/rustnet" rel="nofollow">https://github.com/domcyrus/rustnet</a> which is open source and cross-platform (Linux, macOS, Windows) with real-time connection monitoring, deep packet inspection, process identification, and a terminal UI. Obviously a different kind of tool than a polished GUI app like this, but if you live in the terminal or want something you can script and automate, it might be worth a look.<p>On the macOS network tools side, have you looked into PKTAP? I use it in RustNet to get process-level attribution for network connections. Might be worth exploring if you want to tie traffic back to specific processes.</p>
]]></description><pubDate>Tue, 10 Feb 2026 16:38:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46962443</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=46962443</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46962443</guid></item><item><title><![CDATA[New comment by hubabuba44 in "Linux Sandboxes and Fil-C"]]></title><description><![CDATA[
<p>Thanks, I see. From the title I didn't infer that it's browser or openssh specific but that's ok.</p>
]]></description><pubDate>Sun, 14 Dec 2025 15:52:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=46263929</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=46263929</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46263929</guid></item><item><title><![CDATA[New comment by hubabuba44 in "Linux Sandboxes and Fil-C"]]></title><description><![CDATA[
<p>Ok, if you say so</p>
]]></description><pubDate>Sun, 14 Dec 2025 14:07:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=46263071</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=46263071</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46263071</guid></item><item><title><![CDATA[New comment by hubabuba44 in "Linux Sandboxes and Fil-C"]]></title><description><![CDATA[
<p>Why doesn't it mention landlock?</p>
]]></description><pubDate>Sun, 14 Dec 2025 13:02:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46262719</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=46262719</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46262719</guid></item><item><title><![CDATA[New comment by hubabuba44 in "Ask HN: What are you working on? (October 2025)"]]></title><description><![CDATA[
<p>I'm working on rustnet (<a href="https://github.com/domcyrus/rustnet" rel="nofollow">https://github.com/domcyrus/rustnet</a>) which is a cross-platform network monitoring TUI built with Rust that provides real-time visibility into network connections with deep packet inspection.<p>Currently I'm spending numerous hours trying to package for multiple Linux distributions. I have to say that building for Ubuntu using the Debian build system and Launchpad seems like a way to spend days for nothing except frustration :) Maybe the problem is also me / PEBKAC</p>
]]></description><pubDate>Mon, 13 Oct 2025 16:40:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=45570421</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=45570421</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45570421</guid></item><item><title><![CDATA[New comment by hubabuba44 in "Show HN: RustNet, a network monitoring TUI with process identification"]]></title><description><![CDATA[
<p>Thank you very much!<p>There is no analytics function yet, but if you'd like, please open an issue or PR, I would very much appreciate that.</p>
]]></description><pubDate>Sat, 20 Sep 2025 07:48:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=45311351</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=45311351</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45311351</guid></item><item><title><![CDATA[Show HN: RustNet, a network monitoring TUI with process identification]]></title><description><![CDATA[
<p>Hi HN! I built RustNet, a Terminal UI based network monitor written in Rust that shows real-time connections with process identification and protocol detection.<p>What may make it interesting:<p>• Deep packet inspection for HTTP, HTTPS/TLS (with SNI), DNS, and QUIC protocol detection<p>• Process identification using eBPF on Linux (experimental) and PKTAP on macOS which does also catch short-lived processes that polling procfs or lsof would miss<p>• Multi-threaded packet processing with lock-free data structures for the UI<p>• Cross-platform (Linux, macOS, Windows but process identification so far only on Linux/macOS)<p>The eBPF implementation was a bit more tricky to implement than using PKTAP, but it was very interesting to learn about how to hook into tcp_connect, udp_sendmsg, etc. in order to catch process info before connections disappear.<p>I built this as a lightweight Wireshark alternative for quick TUI based network inspection with process identification.<p>Install: cargo build --release, run with sudo or set capabilities. Homebrew tap also available.<p>Would love feedback on the project and any ideas for additional protocol detection or any other suggestions. Thanks</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45303439">https://news.ycombinator.com/item?id=45303439</a></p>
<p>Points: 5</p>
<p># Comments: 2</p>
]]></description><pubDate>Fri, 19 Sep 2025 16:21:38 +0000</pubDate><link>https://github.com/domcyrus/rustnet</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=45303439</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45303439</guid></item><item><title><![CDATA[New comment by hubabuba44 in "[dead]"]]></title><description><![CDATA[
<p>Looks like this tech is a bit brittle.</p>
]]></description><pubDate>Wed, 30 Apr 2025 14:34:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=43845847</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=43845847</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43845847</guid></item><item><title><![CDATA[New comment by hubabuba44 in "CVE program faces swift end after DHS fails to renew contract [fixed]"]]></title><description><![CDATA[
<p>To me it looks too chaotic to be a planned privatization plan but who knows.</p>
]]></description><pubDate>Wed, 16 Apr 2025 10:42:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=43703699</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=43703699</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43703699</guid></item><item><title><![CDATA[New comment by hubabuba44 in "CVE program faces swift end after DHS fails to renew contract"]]></title><description><![CDATA[
<p>We will see. I understand that money shouldn't be an issue but trust might be, no?</p>
]]></description><pubDate>Wed, 16 Apr 2025 08:36:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=43702988</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=43702988</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43702988</guid></item><item><title><![CDATA[New comment by hubabuba44 in "CVE program faces swift end after DHS fails to renew contract"]]></title><description><![CDATA[
<p>Cool thanks!</p>
]]></description><pubDate>Wed, 16 Apr 2025 08:15:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=43702842</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=43702842</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43702842</guid></item><item><title><![CDATA[New comment by hubabuba44 in "CVE program faces swift end after DHS fails to renew contract"]]></title><description><![CDATA[
<p>I assume that this comment should go somewhere else or I'm not able to decipher the message ;)</p>
]]></description><pubDate>Wed, 16 Apr 2025 07:26:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=43702497</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=43702497</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43702497</guid></item><item><title><![CDATA[New comment by hubabuba44 in "CVE program faces swift end after DHS fails to renew contract [updated]"]]></title><description><![CDATA[
<p>The real irony here is that a lot of ycombinator founders and the people reading HN were exactly the ones making this possible and now start to wonder why the snake eats its own tail.</p>
]]></description><pubDate>Wed, 16 Apr 2025 07:15:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=43702424</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=43702424</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43702424</guid></item><item><title><![CDATA[New comment by hubabuba44 in "HTTP/3 is everywhere but nowhere"]]></title><description><![CDATA[
<p>If the initial tcp 3 way handshake fails it can be quite a bit longer you would have to wait than a few ms. Depending on OS it is a second or more.</p>
]]></description><pubDate>Mon, 17 Mar 2025 14:51:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=43389166</link><dc:creator>hubabuba44</dc:creator><comments>https://news.ycombinator.com/item?id=43389166</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43389166</guid></item></channel></rss>