New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
I'm on node2 but it appears to have been rebooted 2 days ago - or at least my container was...
06:01:59 up 2 days, 7:29, 1 user, load average: 0.00, 0.00, 0.00
yours
just got mine:
Thanks @Starwind & Host1free
They say they allow(ed) multis, so I doubt it is that. If I were them I would ban the abusers first.
M
Didn'0t read that, nice catch.
By 'multis' do you mean you're allowed multiple free VPS' from Host1Free?
@Starwind
I'm on node 11 and this is what I currently get, in non-peak time.
Just wondering if this is simply the I/O speed of node 11 or someone is hogging the resources. :?
and would be nice if you could setup a way of enabling kernel module such as ppp and allowing rDNS change
Great service btw.
No, not really, they said they will be cleaning up about half of the users but so far are lenient while multis are not looked into as of now.
TL;DR eh ?
M
sometimes. it is too much info and sometimes i'm @ work, like now haha
I promised I will keep things current.
Been left logged since before weekend, it is starting to prove itself, can run a blog at least for now, this is top output atm:
top - 10:07:45 up 3 days, 20:01, 1 user, load average: 0.00, 0.00, 0.00
Tasks: 31 total, 1 running, 30 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.0%us, 0.0%sy, 0.0%ni,100.0%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 131072k total, 71344k used, 59728k free, 0k buffers
Swap: 655360k total, 14856k used, 640504k free, 45616k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
1 root 20 0 2160 248 220 S 0.0 0.2 0:03.18 init
2 root 20 0 0 0 0 S 0.0 0.0 0:00.00 kthreadd/7543
3 root 20 0 0 0 0 S 0.0 0.0 0:00.00 khelper/7543
358 named 20 0 50144 1368 724 S 0.0 1.0 0:02.06 named
376 root 20 0 7244 392 300 S 0.0 0.3 0:00.25 sshd
416 root 20 0 3716 200 192 S 0.0 0.2 0:00.01 mysqld_safe
466 mysql 20 0 137m 5988 2028 S 0.0 4.6 1:32.92 mysqld
488 root 20 0 3720 604 488 S 0.0 0.5 0:00.00 sh
620 root 20 0 4496 308 232 S 0.0 0.2 0:00.79 crond
636 root 20 0 5688 184 164 S 0.0 0.1 0:00.00 saslauthd
637 root 20 0 5688 56 40 S 0.0 0.0 0:00.00 saslauthd
701 root 20 0 1816 412 304 S 0.0 0.3 0:02.50 syslogd
704 root 20 0 2836 528 348 S 0.0 0.4 0:01.13 xinetd
721 qmails 20 0 2008 220 120 S 0.0 0.2 0:00.07 qmail-send
723 qmaill 20 0 1756 232 164 S 0.0 0.2 0:00.00 splogger
724 root 20 0 1768 152 72 S 0.0 0.1 0:00.00 qmail-lspawn
725 qmailr 20 0 1764 148 72 S 0.0 0.1 0:00.00 qmail-rspawn
726 qmailq 20 0 1748 136 80 S 0.0 0.1 0:00.00 qmail-clean
730 root 20 0 6944 552 176 S 0.0 0.4 0:00.05 authdaemond
732 root 20 0 1784 188 124 S 0.0 0.1 0:00.53 tcpserver
735 root 20 0 1784 172 112 S 0.0 0.1 0:00.00 tcpserver
741 root 20 0 1784 184 124 S 0.0 0.1 0:00.42 tcpserver
743 root 20 0 1784 172 112 S 0.0 0.1 0:00.00 tcpserver
753 root 20 0 6944 672 284 S 0.0 0.5 0:00.11 authdaemond
4772 root 20 0 10236 1204 640 S 0.0 0.9 0:00.09 sshd
4774 root 20 0 3720 820 592 S 0.0 0.6 0:00.04 bash
11530 clamav 20 0 15428 1512 872 S 0.0 1.2 1:12.85 freshclam
15825 apache 20 0 6596 1364 692 S 0.0 1.0 0:00.63 lighttpd
15864 lxlabs 20 0 5684 920 476 S 0.0 0.7 0:00.59 kloxo.httpd
15870 root 20 0 26752 14m 3852 S 0.0 11.3 0:01.45 php
17998 root 20 0 2292 1036 832 R 0.0 0.8 0:00.12 top
M
how about dd test? mine is around 5~10M
I'm getting 22MB and I don't expect it to be any better.
Your wish is my command:
dd if=/dev/zero of=test bs=64k count=16k conv=fdatasync
16384+0 records in
16384+0 records out
1073741824 bytes (1.1 GB) copied, 30.2403 seconds, 35.5 MB/s
A previous try was lower, it looks like they started to clean up. However, even with 10 MB you can still host your blog and it moves pretty decent.
M
Not multis are the problem. Multis are OK, if compared to DDossers (those are sending ddos attacks from hacked h1f (taken from other users) free VPS).
We are working on catching them and it seems like we've developed a successfully working system. :-) Weeee! You can expect a performance jump in next few days.
I doubt those are really hacked if the problem is so big, most likely regged by them. Besides, DDoS does not generate high io, only sending some packets, shouldnt, tho I am not familiar with those scripts. And they are not real hackers, just some scripters, hard to believe they can hack so many VPSes if they dont have some known security flaw.
M
I would imagine that many (many!) unexperienced users that don't know anything about linux server administration signed up for one of these free VPSses. I guess its fairly easy to scan the Host1Free IP range and check for vulnerable software/crappy configurations
A user that doesnt know much will probably not be able to install things.
The most dangerous is the one that knows how to install but doesnt know how to secure.
I did run yum update, also bothered to change pass for kloxo, perhaps the images deployed need to be up-to-date, but running such a thing is a nightmare security-wise.
I guess you are right, problem is, how to stop this ? How to keep the VPSes secure if the users dont know how ?
How do hosts manage the unmanaged security ? Leave the VPS get hacked and then suspend it ?
Brrrr.... This hosting business is very scary, I would imagine ppl that are afraid of Tor know how to secure their servers even if the users dont. Otherwise one hacked vps can run for months without being noticed if the hacker is careful.
M
Host1Free could scan their VPSses themselves for known security holes
It's gonna be hard... If they suspend it, then the user can just open another and make the same mistakes. They cant possibly nanny everyone and just suspending wont work, that is probably why not many ppl offer free VPSes, although paying customers could be just as illiterate.
M
Wow, here, you shouldn't complain as it is a free VPS, the speed is acceptable, yet host1free is working really well.
I am not complaining at all Actually I am amazed on how well it works, I used to pay for less, tho not recently.
M
Interesting, they're actually legit. I signed up about a month ago and nothing ever happened. No email, nothing. Couldn't even login after signing up. Now the signup process seems vague. I hit the "like" button.
Screenshot:
I started to face problems now. Sending a reboot thru VPS CP:
22:14:18 up 5 days, 9:36, 3 users, load average: 0.42, 0.41, 0.27
[root@a3c /]# reboot
shutdown: Failed to open socket: Cannot allocate memory
Mine has been up and running fine for four days.
But I won't use it for anything remotely important, as with zero cost comes zero accountability. It might disappear tomorrow
The company seems honest and the service is acceptable, but take it for what it's worth
Just as well, it's been horrible lately. Rampant abuse I guess.
Now if I could just cancel the sucker.... I can't login to their 'account' area, and 'retrieve password' gives me a 'bad email' error. D'oh, I know my email address. And it works fine logging in to their SolusVM....
Just for running Lighttpd, without mySQL.
Never reboot it since I got it
Looks like it depends on node.
They will probably clean up the earlier nodes as they got the most abusers there and learned how to deal with it a bit later, hence the no 10 node is stable and quite fast (I am on 10).
M
node 5 -_-
I signed up but didn't get approved
Yes, node5 is pretty much hosed.