Re: Getting hit hard by CHINANET

2015-03-23 Thread Colin Johnston
China network blocks work great, I wish did not have to use but they never respond to admin or abuse contacts either Colin On 23 Mar 2015, at 13:06, Ray Soucy r...@maine.edu wrote: I did a test on my personal server of filtering every IP network assigned to China for a few months and over

Re: Getting hit hard by CHINANET

2015-03-23 Thread Ca By
On Monday, March 23, 2015, Ray Soucy r...@maine.edu wrote: I did a test on my personal server of filtering every IP network assigned to China for a few months and over 90% of SSH attempts and other noise just went away. It was pretty remarkable. Working for a public university I can't block

Re: Getting hit hard by CHINANET

2015-03-23 Thread Ray Soucy
I did a test on my personal server of filtering every IP network assigned to China for a few months and over 90% of SSH attempts and other noise just went away. It was pretty remarkable. Working for a public university I can't block China outright, but there are times it has been tempting. :-)

Re: Getting hit hard by CHINANET

2015-03-23 Thread Paul S.
+1, I've had good luck with this as well. My experiences pretty much mirror yours, NOC says no, had to ask my SE to take care of it. Didn't have any issues after. On 3/23/2015 午後 11:55, Ca By wrote: On Sun, Mar 23, 2014 at 3:43 AM, Justin M. Streiner strei...@cluebyfour.org wrote: On Mon,

Re: Getting hit hard by CHINANET

2015-03-23 Thread Ca By
On Sun, Mar 23, 2014 at 3:43 AM, Justin M. Streiner strei...@cluebyfour.org wrote: On Mon, 23 Mar 2015, Ca By wrote: Having your upstream apply a permanent udp bw policer, say 5 or 10x busy hour baseline, works well for this. Many upstreams will not do that, particularly on a permanent

Re: (network)technologies used by NSA for data collection

2015-03-23 Thread Tei
This stuff is soo cool :D I understands less than half of it, but I have found this link that give some light. https://robert.sesek.com/2014/9/unraveling_nsa_s_turbulence_programs.html It seems they had a system to backup 3 days of the internet, all data. But such system failed because Internet

Re: Getting hit hard by CHINANET

2015-03-23 Thread Justin M. Streiner
On Mon, 23 Mar 2015, Ca By wrote: Having your upstream apply a permanent udp bw policer, say 5 or 10x busy hour baseline, works well for this. Many upstreams will not do that, particularly on a permanent basis. They might do something temporarily to deal with an incident, but many of the

Re: (network)technologies used by NSA for data collection

2015-03-23 Thread Mike A
On Sun, Mar 22, 2015 at 04:05:35AM +0200, Martin T wrote: Hi, I watched Citizenfour(imdb.com/title/tt4044364/) documentary and at 41:12 Edward Snowden gives a brief overview of some of the leaked documents to journalists Glenn Greenwald and Ewen MacAskill. At 42:57 Snowden mentions devices

HOSTUS Contact Atlanta DC issues

2015-03-23 Thread Robert Webb
Apologies for the noise. Looking for information about Hostus issues in Atlanta. I have two servers that are not accessible, one fails login from the VPS Control Panel. Have had high priority ticket in for over an hour with no response and nothing on the network status as far as any issues.

Re: Last-call DoS/DoS Attack BCOP

2015-03-23 Thread Yardiel D . Fuentes
Thank you all who have contributed your feedback, comments and discussion points towards the DDoS/DoS attack BCOP. I have updated the current version of the BCOP with the agreed upon feedback: http://bcop.nanog.org/index.php/BCOP_Drafts Since there have been good feedback for this BCOP. The

Re: Last-call DoS/DoS Attack BCOP

2015-03-23 Thread John Kristoff
On Mon, 23 Mar 2015 19:00:14 -0400 Yardiel D.Fuentes yard...@gmail.com wrote: Since there have been good feedback for this BCOP. The committee decided to extend the last-call period for another two weeks to give ample chance to further feedback. So, it is not late for more comments, Hi