"No, seriously. All those things Google couldn't find anymore? Top of the search pile. Queries that generated pages of spam in Google results? Fucking pristine on Kagi – the right answers, over and ov

Optional@lemmy.world to Technology@lemmy.world – 275 points –
pluralistic.net

cross-posted from: https://lemmy.ml/post/14100831

"No, seriously. All those things Google couldn't find anymore? Top of the search pile. Queries that generated pages of spam in Google results? Fucking pristine on Kagi – the right answers, over and ov

110

You are viewing a single comment

No, as in they are public record.

If you use a wildcard let's encrypt SSL to encrypt www.mydomain.com and VPS.mydomain.com and secret.mydomain.com and allmyporn.mydomain.com, and Plex.mydomain.com, and gitlab.mydomain.com

Then it is public record that mydomain.com has associated with it the CNAMES "www" "VPS" "secret" "allmyporn" "Plex" and "gitlab".

It can be looked up by anyone here. Just type in "%.yourdomain"

That is to say if you use a wildcard letsencrypt SSL on all your subdomains for you self hosting project, you're more exposed than want to be.

No it's not. I have several wildcards. Your tool doesn't show any of the subdomains i have then used on. Go hit %.saik0.com and show me where lemmy.saik0.com shows up. I'll wait.

2 more...
2 more...