Hacker News new | past | comments | ask | show | jobs | submit login

If your IRCd allows an unauthenticated connection to start spamming like that, changing the port so a browser can't do it is just wallpapering over the real problem. Anybody that cared to could just use any other software to spam your IRCd.



Yes, a public & open IRC would be another problem... but that's not what I'm saying. I'm talking about an internal server.

> Anybody that cared to could just use any other software to spam your IRCd.

No they couldn't use other software. They couldn't access the server, cuz they are not inside of the network.

Their javascript is inside the network tho, that's why browsers implement this port blacklist.

Moving an internal app to a non-standard port might expose it to malicious javascript, that's all I'm saying.


The issue remains that your ircd is still wide open, waiting for somebody more creative to find another way of opening connections inside your LAN on arbitrary ports. Counting on browsers to keep your network secure is foolish.


> The issue remains that your ircd is still wide open

Wide open, from within the LAN... not many consider internal apps wide open. Besides browsers, you need actual hacking to reach internal services, a SSRF for example. Or real remote code execution and at that point, you have other problems.

> Counting on browsers to keep your network secure is foolish.

I think what you're saying is: treating the internal network as secure is foolish. That I would agree with.

I never said you should rely on the browsers port banning. It's the other way around, people usually don't even know you can talk to IRC over HTTP and therefore don't even consider it a risk and are protected without even knowing.

My point is not "use port banning as security measure". My point is just: if you move apps to a non-standard port you might expose it to browsers, so better use the standard!




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: