Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


KVM 1tb for 3 yers !! only 50 eur Located in Romania-Norway Limited Stoc ! - Page 19
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

KVM 1tb for 3 yers !! only 50 eur Located in Romania-Norway Limited Stoc !

11617192122

Comments

  • I click, but nothing gets added to my shopping cart. Are they out??

  • thank you

  • @cociu Thanks for being so open, it really increased my confidence in your business practives. If they're still available, I'd love to have a 3-y Norway special 1tb..!

    Thanked by 1yoursunny
  • @pepa65 said:
    I click, but nothing gets added to my shopping cart. Are they out??

    It looks like .no is working, but .ro is not.

  • @pepa65 said:
    I click, but nothing gets added to my shopping cart. Are they out??

    I think both plans are currently out of stock.

    Thanked by 1pepa65
  • @cociu said: so what we have do is a tunnel with norway and anmounced the prefix of thath servers via norway.

    Ok I understand now why some servers became available through the tunnel. Great work @cociu I hope you'll be able to get some rest now, you deserve it!

    Thanked by 1bdl
  • @JerryHou said:

    @pepa65 said:
    I click, but nothing gets added to my shopping cart. Are they out??

    I think both plans are currently out of stock.

    yea waiting for it to be back in stock

  • Sorry for nagging @cociu I didn't realize how old this threat was... I thought it was from the time of the raid.

  • @Sgrocks said: yea waiting for it to be back in stock

    Just heard it won't be back in stock... :neutral:

  • @pepa65 said: Just heard it won't be back in stock...

    definetly not because this was a verry verry special price.

    Thanked by 1pepa65
  • @cociu curious what happened to the Liberty Global Upstream ?

  • dfroedfroe Member, Host Rep
    edited November 2020

    For those encountering some packet loss or connectivity issues, it looks like the new upstream provider utilizes some PPPoE reducing the maximum possible MTU size.

    From 89.35.3x.1 icmp_seq=1 Frag needed and DF set (mtu = 1492)

    Most TCP/IP stacks shouldn't notice anything and perform proper MTU path discovery. However some UDP based applications or IPSec tunnels may break or show issues with large packets when not properly adjusted to an outer MTU of 1492 bytes.

    Just as a useful note. If the real MTU of the network is 1492, one should set the local ethernet MTU to 1492 as well.

    ip link set dev eth0 mtu 1492

    Or as a hint to @cociu to configure the MTU to 1500 on the core router if possible in case this is a just an obsolete fragment of the last days. :)

    Thanked by 1vimalware
  • I don't remember but I think he mentioned running over GRE.

  • dfroedfroe Member, Host Rep
    edited November 2020

    @mikewazar said:
    I don't remember but I think he mentioned running over GRE.

    I think this was a temporary workaround to bring up at least a few VPS nodes while the core router was still offline for most of the subnets. BTW GRE would add more overhead than just 8 bytes which is typical but not limited to PPPoE.

    Currently according to traceroute he is routing outbound via Turk Telekom (Euroweb Romania, AS6663) with superb latency to DE-CIX. I doubt (though I don't know) there is any tunneling in between.

    Thanked by 1mikewazar
  • @dfroe said: Currently according to traceroute he is routing outbound via Turk Telekom (Euroweb Romania, AS6663) with superb latency to DE-CIX. I doubt (though I don't know) there is any tunneling in between.

    this is correct , this is a upstream what we use for some of our clients , we will switch back to gts in a week or so , Also this upstream will be my compensation to all people who was suffered with us this days (is cost us much more than others because yes is really good one, for exemple ping to google is less than 4ms)

    Thanked by 3dfroe atomi vimalware
  • cociucociu Member
    edited November 2020

    @Edding said: @cociu curious what happened to the Liberty Global Upstream ?

    UPC (liberty global) was sell to Vodafone Romania (last year), and we have wait 6 month to contact us some commercial accountant or have the posibility to comunicate with someone there and nobody contact me (to mention i have been top1 consumer from oradea in UPC) so i have feel this is not a good way to have any colaboration and i have downgrade the line to 1gbps , after this yes i have been contacted but i am not interesed anymore.

  • @yoursunny said:

    @miu said:

    @yoursunny said:

    @jsg said:

    @yoursunny said:
    2. Liquid nitrogen the servers. Powering down the router could cause illegal programs to self-destruct after losing connection. Liquid nitrogen preserves the evidence.

    Re 2: (a) ... liquid nitrogen the whole DC or even just a hall?

    Locate the server by setting up port mirroring on the switches and observing traffic on the mirror port. This is undetectable from the servers.
    Then, pull the server and put into liquid nitrogen.

    i think your ideas are wild
    why would they put the whole server in nitrogen? it's nonsense
    1) if they want the contents of RAM, then connect/intrude into running server through some free (physical) ports of the server and copy it

    What is a "physical port"? Do you mean PCIe bus and DMA?

    2) if the free ports are not (or are disabled in the BIOS) then (as last possible and extreme option) they would proceed to the server shutdown and quickly move its RAMs sticks to nitrogen (since the contents remain in RAM for a few seconds after shutdown, and strong nitrogen cooling will prolong it to a few tens of minutes)

    Makes sense.

    of course, not everyone can/is able/know perform these (secret) operations and special techniques
    but they must have the best IT and HW specialists with extra equipment hired for it

    In computer security, we have to assume the infrastructure and code are public. Only the keys are secret.

    @TimboJones said:

    @yoursunny said:

    @default said:

    @yoursunny said:
    2. Liquid nitrogen the servers. Powering down the router could cause illegal programs to self-destruct after losing connection. Liquid nitrogen preserves the evidence.

    So you are trying to suggest that if connection drops, all data on the dedicated servers is deleted automatically? Or some fork bomb is initiated forcing a restart which no longer mounts the encrypted partition?

    Well... if someone has the money to pay for 75 dedicated servers over 2 years, I can obviously assume they have such safety measures in place.

    For maximum safety,

    1. Store in RAM. Never write to disk.
    2. Organize the nodes as a DHT or other distributed network.
    3. Put no more than 10% of total nodes in one place.
    4. If a node loses connection to more than 30% of the network, it reboots and loses all content in RAM.

    The content is striped:

    1. You need 3 packets XOR'ed together to reconstruct a data segment.
    2. Each packet has 3 replicas.
    3. 3 replicas of 3 packets of a data segment are spread in 9 nodes in different locations.

    If any location is taken offline, packets at this location will vanish, but the content network survives.
    If 3 locations (30%) go offline, the whole network shuts down.
    Investigators must liquid nitrogen 3 locations simultaneously to collect evidence of some data segments.

    What is it exactly you think blasting the servers with liquid nitrogen will do that would allow them to practically retrieve data from the drives?

    Edit: totally missed the RAM only in the very first point, lol. That wouldn't make sense for media consumption when everything is triplicated.

    Facebook stores everything in RAM using memcached, and they must have more than one copy.

    They store media on CDN's and have external access to databases. The servers run the infrastructure, not the data.

    But they'd need to know ahead of time the infrastructure and reconstruction, which would take secret defense budget levels of money and time.

    In computer security, we have to assume the infrastructure and code are public. Only the keys are secret.

    For a secret pedo ring? GTFO

    But then you just add encryption to your hypothetical and it's all moot.

    Only if the keys are locked in TPM.

    Uh, no.

    You know the shit (CSI Cyber) you see on TV never makes sense and just needs to fool the type of person that watches CSI Cyber in the first place.

    I've been taking my power strips apart because CSI: Cyber says they can contain malware.

    That I believe (not that you have malware, but that you'd actually check).

    Thanked by 1yoursunny
  • hot threads on this month

  • defaultdefault Veteran
    edited November 2020

    Case study: could a data center be completely disconnected if someone hosted some Tor relay nodes?

    In theory this would be possible, because no data is stored, yet the servers can be used for abuses simply because of the design of Tor network anonymity. As such, Romanian police for example would disconnect the whole data center for more than 48 hours, until they identify and confiscate the Tor relays.

    Maybe police could extrapolate some arguments in such scenario.

  • In my experience these couple years, police only make everything worse.

    Thanked by 1mikewazar
  • bacloudbacloud Member, Patron Provider

    @elliotc said:
    In my experience these couple years, police only make everything worse.

    Why? Did police learn how to catch bad guys?

    Thanked by 1vimalware
  • @bacloud said:

    @elliotc said:
    In my experience these couple years, police only make everything worse.

    Why? Did police learn how to catch bad guys?

    It's good enough if they're not the bad guys.

    Thanked by 1mikewazar
  • jsgjsg Member, Resident Benchmarker

    @bacloud said:

    @elliotc said:
    In my experience these couple years, police only make everything worse.

    Why? Did police learn how to catch bad guys?

    I get your point and actually agree. Yes, the bad guys should be weeded out.

    But that's not the point here. The point is how far, how much going all in should LEA be allowed, how much damage may they create when trying to find data/evidence on a few criminals?

    It's obviously not acceptable for LEA to freeze a whole small town for 2 days and along the way to seriously damage the town hall and some other buildings and businesses just because they think that there is one or two criminals operating from the town.
    So why do you think that would be perfectly OK on the internet?

  • @default said:
    Case study: could a data center be completely disconnected if someone hosted some Tor relay nodes?

    In theory this would be possible, because no data is stored, yet the servers can be used for abuses simply because of the design of Tor network anonymity. As such, Romanian police for example would disconnect the whole data center for more than 48 hours, until they identify and confiscate the Tor relays.

    Maybe police could extrapolate some arguments in such scenario.

    Well Tor relays still does not expose encrypted traffic so no one would know.

    You should be asking about TOR exit nodes.

  • @MadSprite said:

    @default said:
    Case study: could a data center be completely disconnected if someone hosted some Tor relay nodes?

    In theory this would be possible, because no data is stored, yet the servers can be used for abuses simply because of the design of Tor network anonymity. As such, Romanian police for example would disconnect the whole data center for more than 48 hours, until they identify and confiscate the Tor relays.

    Maybe police could extrapolate some arguments in such scenario.

    Well Tor relays still does not expose encrypted traffic so no one would know.

    You should be asking about TOR exit nodes.

    I ask about Tor relay because in this scenario the 75 dedicated were involved in some network servers for criminal activity.

  • bacloudbacloud Member, Patron Provider
    edited November 2020

    @jsg said:

    @bacloud said:

    @elliotc said:
    In my experience these couple years, police only make everything worse.

    Why? Did police learn how to catch bad guys?

    I get your point and actually agree. Yes, the bad guys should be weeded out.

    But that's not the point here. The point is how far, how much going all in should LEA be allowed, how much damage may they create when trying to find data/evidence on a few criminals?

    It's obviously not acceptable for LEA to freeze a whole small town for 2 days and along the way to seriously damage the town hall and some other buildings and businesses just because they think that there is one or two criminals operating from the town.
    So why do you think that would be perfectly OK on the internet?

    Well, we had a police investigation too, as it is not really possible to avoid that, no matter that we have a strict abuse policy. Everything was very correct without asking to down the whole network.

    Probably there is something we do not know. If a representative of the provider disagrees to provide some information, help for investigation, why police should work correctly? They simply ask to shut down the whole network. I know some real examples. I can't tell, that it is the situation we have now, but the fact, that there is something we do not know, some reasons they don't want us to know.

    Another fact - HS declares, that they accept abusive customers and I can predict that it is not the last time they got network shut down by police. It will continue and the situation will get worse and worse every time. Why? Due to the same reason, as Cocu said, the network was shut down this time - corruption, bad police work, incompetence, etc. Police do not really want to work on those cases, deal with that, they prefer to be blind. At the end of patience, they will try to close those "complaints, case generators" as no cases - no problems, less work. No one wants to work hard.

    Please save my words.

  • jsgjsg Member, Resident Benchmarker

    @bacloud said:
    If a representative of the provider disagrees to provide some information, help for investigation, why police should work correctly?

    Because the law requires LEA to act properly. No if, no but.

    As for "it will happen again": well, I guess that depends on how @cociu reacts now. If he just accepts it, yes, it will happen again. And again. But if he reacts in a way that is painful for them it'll highly likely not happen again. Cops are humans after all and just like criminals they (sometimes mis-) calculate what they can get away with.

    That said, I agree that cociu should slow down somewhat on the kind of marketing that can easily be misunderstood to mean "criminals are welcome".

  • @default said:

    @MadSprite said:

    @default said:
    Case study: could a data center be completely disconnected if someone hosted some Tor relay nodes?

    In theory this would be possible, because no data is stored, yet the servers can be used for abuses simply because of the design of Tor network anonymity. As such, Romanian police for example would disconnect the whole data center for more than 48 hours, until they identify and confiscate the Tor relays.

    Maybe police could extrapolate some arguments in such scenario.

    Well Tor relays still does not expose encrypted traffic so no one would know.

    You should be asking about TOR exit nodes.

    I ask about Tor relay because in this scenario the 75 dedicated were involved in some network servers for criminal activity.

    You can run Tor relay's in your home because you are only a transport of encrypted data. No one will ever know that you are hosting, transiting, or browsing criminal if you are Tor relay.

    Tor Exits nodes will be the ones exposing the criminal content.

    I'm correcting what your scenario would be about, since Tor Relays does not expose original traffic.

  • bacloudbacloud Member, Patron Provider

    @jsg said:

    @bacloud said:
    If a representative of the provider disagrees to provide some information, help for investigation, why police should work correctly?

    Because the law requires LEA to act properly. No if, no but.

    As for "it will happen again": well, I guess that depends on how @cociu reacts now. If he just accepts it, yes, it will happen again. And again. But if he reacts in a way that is painful for them it'll highly likely not happen again. Cops are humans after all and just like criminals they (sometimes mis-) calculate what they can get away with.

    That said, I agree that cociu should slow down somewhat on the kind of marketing that can easily be misunderstood to mean "criminals are welcome".

    Slow down marketing will not help here, the network cleanup is needed, as marketing did its job already.

    You do not really know how the police act when we are talking about data centers. They may deal with you if you work with them together. But, actually, they do not really like to have "case generators", as they have too much work already.

    Serious changes are needed.

  • m4num4nu Member, Patron Provider

    Is the police back @cociu ? VPS and CP are both not reachable.

Sign In or Register to comment.