▲ | lucb1e a day ago | ||||||||||||||||||||||||||||||||||
Wut? That can't have been a chance visit from a crawler unless maybe you linked it within those 3 seconds of creating the subdomain and the crawler visited the page it was linked from in that same second, or you/someone linked to it (in preparation) before it existed and bots were already constantly trying Where did you "create" this subdomain, do you mean the vhost in the webserver configuration or making an A record in the DNS configuration at e.g. your registrar? Because it seems to me that either: - Your computer's DNS queries are being logged and any unknown domains immediately get crawled, be it with malicious or white-hat intent, or - Whatever method you created that subdomain by is being logged (by whoever owns it, or by them e.g. having AXFR enabled accidentally for example) and immediately got crawled with whichever intent I can re-do the test on my side if you want to figure out what part of your process is leaky, assuming you can reproduce it in the first place (to within a few standard deviations of those three seconds at least; like if the next time is 40 seconds I'll call it 'same' but if it's 4 days then the 3 seconds were a lottery ticket -- not that I'd bet on those odds to deploy important software, but generally speaking about how aggressive-or-not the web is nowadays) | |||||||||||||||||||||||||||||||||||
▲ | kstrauser a day ago | parent [-] | ||||||||||||||||||||||||||||||||||
Consensus from friends after I posted that is that attackers monitor the Let's Encrypt transparency logs and pounce on new entries the moment they're created. Here I was using Caddy, which by default uses LE to create a cert on any hosts you define. I can definitely reproduce this. It shocked me so much that I tried a few times: 1. Create a new random hostname in DNS. 2. `tail -f` the webserver logs. 3. Define an entry for that hostname and reload the server (or do whatever your webserver requires to generate a Let's Encrypt certificate). 4. Start your stopwatch. | |||||||||||||||||||||||||||||||||||
|