<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: justin_oaks</title><link>https://news.ycombinator.com/user?id=justin_oaks</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 03:48:02 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=justin_oaks" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by justin_oaks in "Veracrypt project update"]]></title><description><![CDATA[
<p>When a company makes it impossible to correct their stupidity, it's a malicious act. The behavior speaks loud and clear: "We don't care what damage we do to developers or users. And we don't want to hear about it."</p>
]]></description><pubDate>Wed, 08 Apr 2026 15:43:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47691766</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47691766</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47691766</guid></item><item><title><![CDATA[New comment by justin_oaks in "Running Out of Disk Space in Production"]]></title><description><![CDATA[
<p>That happened to me exactly once in my 20-year career. It was on a web server (maybe even NGINX) that had too many cached files.<p>Even though it only happened once, I still set up monitoring for inode exhaustion.</p>
]]></description><pubDate>Tue, 07 Apr 2026 18:36:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47679499</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47679499</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47679499</guid></item><item><title><![CDATA[New comment by justin_oaks in "Installing a Let's Encrypt TLS certificate on a Brother printer with Certbot"]]></title><description><![CDATA[
<p>The list of API integrations provided by the lego project looks quite impressive. <a href="https://go-acme.github.io/lego/dns/index.html" rel="nofollow">https://go-acme.github.io/lego/dns/index.html</a></p>
]]></description><pubDate>Fri, 27 Mar 2026 18:11:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47546224</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47546224</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47546224</guid></item><item><title><![CDATA[New comment by justin_oaks in "Installing a Let's Encrypt TLS certificate on a Brother printer with Certbot"]]></title><description><![CDATA[
<p>Yes, I see that AWS Route53 can limit credential scope. That kind of thing helps a lot.<p>I've never heard of that CNAME approach for changing the validation domain. That looks like a viable solution since it requires a one-time setup on the main domain and ongoing access to the second (validation) domain.</p>
]]></description><pubDate>Fri, 27 Mar 2026 16:42:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47545040</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47545040</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47545040</guid></item><item><title><![CDATA[New comment by justin_oaks in "Installing a Let's Encrypt TLS Certificate on a Brother Printer with Certbot"]]></title><description><![CDATA[
<p>Moving subdomains to separate zones can make sense for a small set of subdomains and all your certificates would be for names under those subdomains. It gets unwieldy if you have to create a separate zone for each certificate because the certificates don't share a subdomain. But this can be a solution in some circumstances. Thanks.<p>I see that AWS permissions can be set to limit the risk of compromised credentials. That's a good idea. I see that the lego project has an example of this in their documentation: <a href="https://go-acme.github.io/lego/dns/route53/index.html#least-privilege-policy-for-production-purposes" rel="nofollow">https://go-acme.github.io/lego/dns/route53/index.html#least-...</a></p>
]]></description><pubDate>Fri, 27 Mar 2026 16:35:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47544904</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47544904</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47544904</guid></item><item><title><![CDATA[New comment by justin_oaks in "Installing a Let's Encrypt TLS Certificate on a Brother Printer with Certbot"]]></title><description><![CDATA[
<p>That looks like a great solution. I'll probably make use of that as soon as it's available.</p>
]]></description><pubDate>Fri, 27 Mar 2026 16:17:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47544685</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47544685</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47544685</guid></item><item><title><![CDATA[New comment by justin_oaks in "Installing a Let's Encrypt TLS Certificate on a Brother Printer with Certbot"]]></title><description><![CDATA[
<p>Ah, that's a clever mechanism. That way the secondary machine could not only keep the token secure, but also validate which DNS records to create.</p>
]]></description><pubDate>Fri, 27 Mar 2026 16:16:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47544677</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47544677</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47544677</guid></item><item><title><![CDATA[New comment by justin_oaks in "Installing a Let's Encrypt TLS certificate on a Brother printer with Certbot"]]></title><description><![CDATA[
<p>Oh... that's fantastic! It specifically addresses my concerns about needing DNS credentials accessible to scripts.<p>The article says it is for those who<p>> prefer to keep DNS updates and sensitive credentials out of their issuance path.</p>
]]></description><pubDate>Fri, 27 Mar 2026 16:13:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=47544637</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47544637</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47544637</guid></item><item><title><![CDATA[New comment by justin_oaks in "Installing a Let's Encrypt TLS certificate on a Brother printer with Certbot"]]></title><description><![CDATA[
<p>Some of this might have been "because I want to see if I can". Another reason is "It bothers me to keep seeing this browser tell me my connection is insecure".<p>As for putting it on a separate VLAN and securing traffic with firewall rules, that may be as much or more trouble than setting up the automated certificate renewal. At least with the automated certificates there may not be any further maintenance required. With firewall rules, you'll need to open up the firewall each time you want a new device to access the printer.</p>
]]></description><pubDate>Fri, 27 Mar 2026 15:46:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47544231</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47544231</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47544231</guid></item><item><title><![CDATA[New comment by justin_oaks in "Installing a Let's Encrypt TLS certificate on a Brother printer with Certbot"]]></title><description><![CDATA[
<p>I read a lot about people running things like Caddy which will automatically retrieve Lets Encrypt certificates. And I think it makes sense for publicly accessible web sites since you can use an HTTP challenge with Let's Encrypt.<p>For internal-use certificates, you'll have to make use of a DNS challenge with Let's Encrypt. I've been hesitant to set that up because I'm concerned about the potential compromise of a token that has permissions to edit my DNS zone. I see that the author creates exactly that kind of token and has permanently accessible to his script. For a home lab where he's the only person accessing his hardware, that's less of a concern. But what about at a company where multiple people may have access to a system?<p>Am I being too paranoid here? Or is there a better way to allow DNS challenges without a token that allows too much power in editing a DNS zone?</p>
]]></description><pubDate>Fri, 27 Mar 2026 15:42:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47544150</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=47544150</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47544150</guid></item><item><title><![CDATA[New comment by justin_oaks in "Yes-rs: A fast, memory-safe rewrite of the classic Unix yes command"]]></title><description><![CDATA[
<p>I agree that it's not a serious project, but I wouldn't call it a joke. Jokes are funny.</p>
]]></description><pubDate>Tue, 27 May 2025 03:25:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=44103707</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=44103707</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44103707</guid></item><item><title><![CDATA[New comment by justin_oaks in "Should I Block ICMP?"]]></title><description><![CDATA[
<p>Without TLS, sometimes still referred to as SSL, a webite's content can be modified by anyone controlling the network path. This includes ISPs and WiFi operators.<p>Sure, your website may have unimportant stuff on it that nobody relies on, but do you want visitors to see ads in your content that you didn't put there?</p>
]]></description><pubDate>Thu, 22 May 2025 01:01:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=44057765</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=44057765</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44057765</guid></item><item><title><![CDATA[New comment by justin_oaks in "SMS 2FA is not just insecure, it's also hostile to mountain people"]]></title><description><![CDATA[
<p>This has been my experience as well.<p>I implemented 2FA for my previous employer and we would have gladly skipped SMS 2FA if we could get away with it.  It's more expensive for the company and the customer. And it sucks to implement because you have to integrate with a phone service. The whole phone system is unreliable or has unexpected problems (e.g. using specific words in a message can get your texts blocked). Problems with the SMS 2FA is a pain for customer service too.</p>
]]></description><pubDate>Wed, 14 May 2025 18:37:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=43987817</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=43987817</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43987817</guid></item><item><title><![CDATA[New comment by justin_oaks in "SMS 2FA is not just insecure, it's also hostile to mountain people"]]></title><description><![CDATA[
<p>I implemented 2FA at a previous job and I was responsible for the production implementation working as expected. My thoughts were that uncompleted 2FA attempts are common for a number of reasons: typos, someone gets distracted, didn't have access to phone at the time, SMS sucks (either our sending side or the receiving side), etc. I didn't put much thought into it beyond that. (Should I?)<p>I implemented rate limiting/lockouts for too many 2FA failures. I added the ability to clear the failed attempt count in our customer support portal.  If we had any problems after those were implemented, I never heard about them.</p>
]]></description><pubDate>Wed, 14 May 2025 18:28:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=43987691</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=43987691</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43987691</guid></item><item><title><![CDATA[New comment by justin_oaks in "Gmail to SQLite"]]></title><description><![CDATA[
<p>You may have to temper your expectations. Free usually means "sells/uses your data to offset costs". If you're OK with that, there's no need to switch off of GMail. If you're not OK with that, you'll have to pay.<p>Also, hosting email under your own domain gives you the freedom to move from one email provider to another even if they do shut down.<p>I put my money where my mouth is. I wanted to degoogle and so pay $50/year for Fastmail. One feature I like is automatically snoozing certain emails. Most of my non-personal email is automatically snoozed until 6pm every day. This way I don't get multiple  notifications throughout the day for emails that aren't time sensitive.</p>
]]></description><pubDate>Sat, 10 May 2025 16:06:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=43946727</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=43946727</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43946727</guid></item><item><title><![CDATA[New comment by justin_oaks in "Grand Theft Auto VI Is Now Coming May 26, 2026"]]></title><description><![CDATA[
<p>I wish consoles were like the Steam Deck: computers running a common OS that just so happen to be used for gaming.</p>
]]></description><pubDate>Fri, 02 May 2025 20:09:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=43874114</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=43874114</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43874114</guid></item><item><title><![CDATA[New comment by justin_oaks in "No as a Service"]]></title><description><![CDATA[
<p>Knowing that there are only 25 responses, it makes it all the more funny that rate limiting is mentioned.<p>And you can host the service yourself! Hard pass. I'll read the 25 responses from your gist. Thanks!</p>
]]></description><pubDate>Wed, 30 Apr 2025 17:15:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=43848162</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=43848162</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43848162</guid></item><item><title><![CDATA[New comment by justin_oaks in "No as a Service"]]></title><description><![CDATA[
<p>Once you remove the duplicates that are different only because of the typos in them, yes, that's correct.</p>
]]></description><pubDate>Wed, 30 Apr 2025 17:08:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=43848081</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=43848081</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43848081</guid></item><item><title><![CDATA[New comment by justin_oaks in "It's Not the Incentives (2018)"]]></title><description><![CDATA[
<p>The author doesn't seem to consider someone's desire to behave morally as an incentive. How odd.</p>
]]></description><pubDate>Mon, 28 Apr 2025 21:35:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=43826392</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=43826392</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43826392</guid></item><item><title><![CDATA[New comment by justin_oaks in "It's Not the Incentives (2018)"]]></title><description><![CDATA[
<p>Avoiding shame is an incentive.<p>It boils down to: "Why are people violating these unenforced rules? Sure it benefits them, but don't they feel bad?"</p>
]]></description><pubDate>Mon, 28 Apr 2025 21:29:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=43826326</link><dc:creator>justin_oaks</dc:creator><comments>https://news.ycombinator.com/item?id=43826326</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43826326</guid></item></channel></rss>