New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
I click, but nothing gets added to my shopping cart. Are they out??
thank you
@cociu Thanks for being so open, it really increased my confidence in your business practives. If they're still available, I'd love to have a 3-y Norway special 1tb..!
It looks like .no is working, but .ro is not.
I think both plans are currently out of stock.
Ok I understand now why some servers became available through the tunnel. Great work @cociu I hope you'll be able to get some rest now, you deserve it!
yea waiting for it to be back in stock
Sorry for nagging @cociu I didn't realize how old this threat was... I thought it was from the time of the raid.
Just heard it won't be back in stock...
definetly not because this was a verry verry special price.
@cociu curious what happened to the Liberty Global Upstream ?
For those encountering some packet loss or connectivity issues, it looks like the new upstream provider utilizes some PPPoE reducing the maximum possible MTU size.
From 89.35.3x.1 icmp_seq=1 Frag needed and DF set (mtu = 1492)
Most TCP/IP stacks shouldn't notice anything and perform proper MTU path discovery. However some UDP based applications or IPSec tunnels may break or show issues with large packets when not properly adjusted to an outer MTU of 1492 bytes.
Just as a useful note. If the real MTU of the network is 1492, one should set the local ethernet MTU to 1492 as well.
ip link set dev eth0 mtu 1492
Or as a hint to @cociu to configure the MTU to 1500 on the core router if possible in case this is a just an obsolete fragment of the last days.
I don't remember but I think he mentioned running over GRE.
I think this was a temporary workaround to bring up at least a few VPS nodes while the core router was still offline for most of the subnets. BTW GRE would add more overhead than just 8 bytes which is typical but not limited to PPPoE.
Currently according to traceroute he is routing outbound via Turk Telekom (Euroweb Romania, AS6663) with superb latency to DE-CIX. I doubt (though I don't know) there is any tunneling in between.
this is correct , this is a upstream what we use for some of our clients , we will switch back to gts in a week or so , Also this upstream will be my compensation to all people who was suffered with us this days (is cost us much more than others because yes is really good one, for exemple ping to google is less than 4ms)
UPC (liberty global) was sell to Vodafone Romania (last year), and we have wait 6 month to contact us some commercial accountant or have the posibility to comunicate with someone there and nobody contact me (to mention i have been top1 consumer from oradea in UPC) so i have feel this is not a good way to have any colaboration and i have downgrade the line to 1gbps , after this yes i have been contacted but i am not interesed anymore.
They store media on CDN's and have external access to databases. The servers run the infrastructure, not the data.
For a secret pedo ring? GTFO
Uh, no.
That I believe (not that you have malware, but that you'd actually check).
hot threads on this month
Case study: could a data center be completely disconnected if someone hosted some Tor relay nodes?
In theory this would be possible, because no data is stored, yet the servers can be used for abuses simply because of the design of Tor network anonymity. As such, Romanian police for example would disconnect the whole data center for more than 48 hours, until they identify and confiscate the Tor relays.
Maybe police could extrapolate some arguments in such scenario.
In my experience these couple years, police only make everything worse.
Why? Did police learn how to catch bad guys?
It's good enough if they're not the bad guys.
I get your point and actually agree. Yes, the bad guys should be weeded out.
But that's not the point here. The point is how far, how much going all in should LEA be allowed, how much damage may they create when trying to find data/evidence on a few criminals?
It's obviously not acceptable for LEA to freeze a whole small town for 2 days and along the way to seriously damage the town hall and some other buildings and businesses just because they think that there is one or two criminals operating from the town.
So why do you think that would be perfectly OK on the internet?
Well Tor relays still does not expose encrypted traffic so no one would know.
You should be asking about TOR exit nodes.
I ask about Tor relay because in this scenario the 75 dedicated were involved in some network servers for criminal activity.
Well, we had a police investigation too, as it is not really possible to avoid that, no matter that we have a strict abuse policy. Everything was very correct without asking to down the whole network.
Probably there is something we do not know. If a representative of the provider disagrees to provide some information, help for investigation, why police should work correctly? They simply ask to shut down the whole network. I know some real examples. I can't tell, that it is the situation we have now, but the fact, that there is something we do not know, some reasons they don't want us to know.
Another fact - HS declares, that they accept abusive customers and I can predict that it is not the last time they got network shut down by police. It will continue and the situation will get worse and worse every time. Why? Due to the same reason, as Cocu said, the network was shut down this time - corruption, bad police work, incompetence, etc. Police do not really want to work on those cases, deal with that, they prefer to be blind. At the end of patience, they will try to close those "complaints, case generators" as no cases - no problems, less work. No one wants to work hard.
Please save my words.
Because the law requires LEA to act properly. No if, no but.
As for "it will happen again": well, I guess that depends on how @cociu reacts now. If he just accepts it, yes, it will happen again. And again. But if he reacts in a way that is painful for them it'll highly likely not happen again. Cops are humans after all and just like criminals they (sometimes mis-) calculate what they can get away with.
That said, I agree that cociu should slow down somewhat on the kind of marketing that can easily be misunderstood to mean "criminals are welcome".
You can run Tor relay's in your home because you are only a transport of encrypted data. No one will ever know that you are hosting, transiting, or browsing criminal if you are Tor relay.
Tor Exits nodes will be the ones exposing the criminal content.
I'm correcting what your scenario would be about, since Tor Relays does not expose original traffic.
Slow down marketing will not help here, the network cleanup is needed, as marketing did its job already.
You do not really know how the police act when we are talking about data centers. They may deal with you if you work with them together. But, actually, they do not really like to have "case generators", as they have too much work already.
Serious changes are needed.
Is the police back @cociu ? VPS and CP are both not reachable.