<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: sedawkgrep</title><link>https://news.ycombinator.com/user?id=sedawkgrep</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 06 May 2026 08:21:55 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=sedawkgrep" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by sedawkgrep in "DeepClaude – Claude Code agent loop with DeepSeek V4 Pro, 17x cheaper"]]></title><description><![CDATA[
<p>I thought this was debunked awhile ago.  ?</p>
]]></description><pubDate>Sun, 03 May 2026 23:49:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=48002864</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=48002864</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48002864</guid></item><item><title><![CDATA[New comment by sedawkgrep in "Why the US Navy won't blast the Iranians and 'open' Strait of Hormuz"]]></title><description><![CDATA[
<p>A strong and convincing rebuttal!</p>
]]></description><pubDate>Wed, 01 Apr 2026 01:02:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47595513</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47595513</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47595513</guid></item><item><title><![CDATA[New comment by sedawkgrep in "So where are all the AI apps?"]]></title><description><![CDATA[
<p>My buddy and I are writing our own CRUD web app to track our gaming.  I was looking at a ticketing system to use for us to just track bug fixes and improvements.  Nothing I found was simple enough or easy enough to warrant installing it.<p>I vibe'd a basic ticketing system in just under an hour that does what we need.  So not 20 mins, but more like 45-60.</p>
]]></description><pubDate>Tue, 24 Mar 2026 16:07:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47504796</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47504796</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47504796</guid></item><item><title><![CDATA[New comment by sedawkgrep in "FCC updates covered list to include foreign-made consumer routers"]]></title><description><![CDATA[
<p>I don't understand why people with this opinion think it's worth the effort to post it.</p>
]]></description><pubDate>Tue, 24 Mar 2026 13:33:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47502361</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47502361</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47502361</guid></item><item><title><![CDATA[New comment by sedawkgrep in "AI coding is gambling"]]></title><description><![CDATA[
<p>You're a gamblin' man, I see...</p>
]]></description><pubDate>Wed, 18 Mar 2026 18:35:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47429599</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47429599</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47429599</guid></item><item><title><![CDATA[New comment by sedawkgrep in "The IRIX 6.5.7M (sgi) source code"]]></title><description><![CDATA[
<p>Thanks - I downloaded the repo but it's only ~64MB zipped.  No way that's all of AIX 4.1.3.  :(</p>
]]></description><pubDate>Fri, 06 Mar 2026 04:27:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=47270877</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47270877</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47270877</guid></item><item><title><![CDATA[New comment by sedawkgrep in "The IRIX 6.5.7M (sgi) source code"]]></title><description><![CDATA[
<p>As a long-time AIX admin I'd LOOOOOVE to see some of the AIX source.<p>I used to be connected to the community where stuff like this was passed around.  But that was a long, long time ago.</p>
]]></description><pubDate>Thu, 05 Mar 2026 16:00:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47263242</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47263242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47263242</guid></item><item><title><![CDATA[New comment by sedawkgrep in "The IRIX 6.5.7M (sgi) source code"]]></title><description><![CDATA[
<p>Dunno but the repo is 4+ years old.</p>
]]></description><pubDate>Thu, 05 Mar 2026 15:59:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47263217</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47263217</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47263217</guid></item><item><title><![CDATA[New comment by sedawkgrep in "Show HN: Local-First Linux MicroVMs for macOS"]]></title><description><![CDATA[
<p>Wow I don't know how I missed that...</p>
]]></description><pubDate>Mon, 23 Feb 2026 20:59:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47128719</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47128719</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47128719</guid></item><item><title><![CDATA[New comment by sedawkgrep in "Show HN: Local-First Linux MicroVMs for macOS"]]></title><description><![CDATA[
<p>Wow I never knew this existed.  Thanks for pointing this out!</p>
]]></description><pubDate>Mon, 23 Feb 2026 15:10:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47123297</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47123297</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47123297</guid></item><item><title><![CDATA[New comment by sedawkgrep in "DOGE Track"]]></title><description><![CDATA[
<p>Do you have any source for any of this?</p>
]]></description><pubDate>Thu, 19 Feb 2026 14:16:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47073969</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47073969</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47073969</guid></item><item><title><![CDATA[New comment by sedawkgrep in "DOGE Track"]]></title><description><![CDATA[
<p>Googling turns up a multitude.  Quick Look says in 2025 $2B worth of us crops went to USAID.<p>More info here.<p><a href="https://www.agweb.com/news/policy/politics/usaid-dismantling-what-it-means-farmers-and-ag-research" rel="nofollow">https://www.agweb.com/news/policy/politics/usaid-dismantling...</a></p>
]]></description><pubDate>Thu, 19 Feb 2026 14:13:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47073934</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47073934</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47073934</guid></item><item><title><![CDATA[New comment by sedawkgrep in "Magnus Carlsen Wins the Freestyle (Chess960) World Championship"]]></title><description><![CDATA[
<p>Indeed. This is Chess 960.</p>
]]></description><pubDate>Mon, 16 Feb 2026 03:44:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47030645</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=47030645</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47030645</guid></item><item><title><![CDATA[New comment by sedawkgrep in "The Book of PF, 4th edition"]]></title><description><![CDATA[
<p>In my experience, PF operates a LOT more like commercial firewalls in how you think about filtering and NAT.<p>In Linux, even with nftables you still have the concepts of "chains" which goes all the way back to the ipchains days. IME this isn't a particularly helpful way of viewing things.  With PF you can simply make your policy decisions on in or out and on which interface(s).  Also I'm not sure I ever saw a useful application of why you'd apply a policy on the pre/post-routing chains that wasn't achievable elsewhere in PF and in a simpler way.<p>Also I've never been a fan of having a command that just inserted or deleted a policy instead of working from a configuration file.  (nft "config" files are really just scripts that run the command successively.)  I get why some folks would want that (it probably makes programmatic work a lot easier) but for me it was never a benefit.<p>Anyhow it's been a long time since I've had to do this kind of thing so maybe I'm out of touch on the details.  Happy to hear about how I'm wrong lol.</p>
]]></description><pubDate>Sun, 01 Feb 2026 19:52:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46848800</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=46848800</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46848800</guid></item><item><title><![CDATA[New comment by sedawkgrep in "IPv6 is not insecure because it lacks a NAT"]]></title><description><![CDATA[
<p>> Surely the variety of NAT that significantly improves the IPv4 address starvation problem (IP Masq by its various names) requires a connection oriented approach to be effective?<p>Actually it doesn't.  Well, not really.<p>With NAT you're generally talking about either 1:1 or 1:many (Masquerading).<p>In all cases the device doing the NAT maintains a table which is referenced for every matching packet that arrives or leaves.<p>In 1:1 NAT, the IP in the packet header (Layer-3) is simply rewritten from one address to the other whenever a packet matching both addresses in the NAT table leaves or arrives.<p>In 1:many NAT, the source port is randomized because you can run into collisions when multiple clients are connecting to the same server:port.  So in that case the NAT table contains IP addresses as well as ports.  When a return packet arrives, it checks the NAT table and rewrites both the L3 and L4 (port) info before passing it along.<p>Often times firewalls will randomize the source port when doing 1:1 NAT as a security measure, but after all these years I don't really remember why that's helpful.  :-\<p>But that's really the extent of tracking connections with NAT.<p>Now when you're talking about firewalling, there's a lot more to track, such as connection start/stop/timeouts/lifetimes, total throughput, TCP state (handshakes, sequence numbers,  etc.), closing open sessions when seeing things like TCP RSTs or FINs or ICMP unreachables.  The amount of data and CPU is dramatically higher, and tailored to the software doing the firewalling.  I believe in many cases simple L3/L4 rewrites can happen in hardware.<p>I haven't talked about any of this in several years so I hope I'm making sense.</p>
]]></description><pubDate>Thu, 22 Jan 2026 16:40:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46721625</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=46721625</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46721625</guid></item><item><title><![CDATA[New comment by sedawkgrep in "IPv6 is not insecure because it lacks a NAT"]]></title><description><![CDATA[
<p>In an enterprise network, it's very, very unlikely that an edge router is doing <i>any</i> firewalling.  They can do it, but it's not only cumbersome to do it there, but also a massive resource drain.<p>Often they do basic stateless packet filtering, but definitely nothing akin to stateful, connection-oriented firewalling.  It's important to make the distinction, because filtering in this case is completely uni-directional and if you want bi-directional equivalence you have to write an inverse rule for it.  Filtering polices are applied per interface, so generally you apply them on the outside only.<p>Think of it as sort of a reverse of an inbound Internet policy - you write all the drop stuff first (e.g. drop any any eq snmp) and the last rule is a permit ip any any.  Next hop is your firewall which does the rest.<p>For site-tos-site b2b connections, we performed NAT (of the untrusted network space) on the border/edge b2b router, and then the traffic was immediately routed to the firewall.  So in this instance, NAT was happening on the router for the customer IP range, and on the firewall for our enterprise IP range.<p>As a convenience to our customers/partners we always presented ourselves as one of our public IP blocks that wasn't Internet-routed.  This prevented them from having any overlapping IP space.<p>Otherwise, NAT is simply a question of configuring it. And at least in the cisco IOS world (I'm a dinosaur) the two features (NAT vs. firewall) are utterly independent.<p><a href="https://community.cisco.com/legacyfs/online/legacy/0/8/0/60080-NAT%20Virtual%20Interface.pdf" rel="nofollow">https://community.cisco.com/legacyfs/online/legacy/0/8/0/600...</a>
<a href="https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/13772-12.html" rel="nofollow">https://www.cisco.com/c/en/us/support/docs/ip/network-addres...</a></p>
]]></description><pubDate>Wed, 21 Jan 2026 18:06:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=46709192</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=46709192</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46709192</guid></item><item><title><![CDATA[New comment by sedawkgrep in "IPv6 is not insecure because it lacks a NAT"]]></title><description><![CDATA[
<p>Not finding anything saying that ISPs have anything to do with Eagerbee.</p>
]]></description><pubDate>Wed, 21 Jan 2026 17:48:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46708921</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=46708921</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46708921</guid></item><item><title><![CDATA[New comment by sedawkgrep in "IPv6 is not insecure because it lacks a NAT"]]></title><description><![CDATA[
<p>yeah but the likelihood of this is incredibly remote.  It would shock me if ISPs didn't have alarms going off if RFC1918 space was suddenly routable within their BGP table.<p>Not to mention the return packet would be NAT'd so the attacker would have to deal with that complication.</p>
]]></description><pubDate>Wed, 21 Jan 2026 12:54:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46705053</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=46705053</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46705053</guid></item><item><title><![CDATA[New comment by sedawkgrep in "IPv6 is not insecure because it lacks a NAT"]]></title><description><![CDATA[
<p>Who exactly is going to route/send an RFC1918 address to an Internet gateway?<p>Are you implying your ISP itself is going to do this?  Because the Internet at-large doesn't have routes for your internal address space.</p>
]]></description><pubDate>Wed, 21 Jan 2026 12:51:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=46705005</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=46705005</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46705005</guid></item><item><title><![CDATA[New comment by sedawkgrep in "IPv6 is not insecure because it lacks a NAT"]]></title><description><![CDATA[
<p>It's absolutely common in enterprise networks.</p>
]]></description><pubDate>Wed, 21 Jan 2026 12:48:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46704965</link><dc:creator>sedawkgrep</dc:creator><comments>https://news.ycombinator.com/item?id=46704965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46704965</guid></item></channel></rss>