Error 403 - Primitive Security Measures on the Forum


  • LAYER 8 Netgate

    Yeah, 5 6 so far from the little skin flutist.



  • Yep, I'm up to 17 now.  Was at 11 or 12 this morning.  He is literally going over every single post of ours and smiting them.

    Jim, Chris or Steve, can you please do something about this guy?



  • @KOM:

    Anyone else's Smite counts going through the roof lately?  I've had 4 since yesterday even after I stopped responding to Quantum.  I have a feeling that this Quantum guy is still having a tantrum and is coming here just to smite anyone who told him off.  So childish.

    @Derelict:

    Yeah, 5 6 so far from the little skin flutist.

    @KOM:

    Yep, I'm up to 17 now.  Was at 11 or 12 this morning.  He is literally going over every single post of ours and smiting them.

    Jim, Chris or Steve, can you please do something about this guy?

    Well maybe if you all didn't have such a need to be right all the time…  ;)  ...you would get along better with others and trolls.  ;)  Nobody likes a know-it-all.  ;)


  • LAYER 8 Netgate

    Well maybe if you all didn't have such a need to be right all the time…  ;)

    Being right is why karma here goes up.

    Nobody likes a know-it-all.  ;)

    Exactly.



  • Nobody likes a know-it-all.

    I don't know anything.  Just ask my wife.

    Oh look,  I'm up to 18 now.  And by wild coincidence, Quantum logged in recently.

    Anyway, I'm done with this thread.



  • In this life…  there are the smarter ones;  and then there are the dumber ones.

    Just an abstract philosophical observation.

    I've told the ones who matter what my plans are now for my Xen system, and what role (if any) that pfSense will play.  Most of you don't want to know though.

    Bye.



  • @Quantum`:

    In this life…  there are the smarter ones;  and then there are the dumber ones.

    Just an abstract philosophical observation.

    I've told the ones who matter what my plans are now for my Xen system, and what role (if any) that pfSense will play.  Most of you don't want to know though.

    Bye.

    Bear in mind that there will always be smarter and dumber than you…Just an abstract philosophical observation.

    F.



  • @Quantum`:

    I've told the ones who matter what my plans are now for my Xen system, and what role (if any) that pfSense will play.  Most of you don't want to know though.

    Bye.

    Not if you are unable to express it without insults.  Which could be a significant indicator of your place on the smarter / dumber scale.

    Wow.  More than 100 smites per post so far, and no applause.



  • And, of course, today someone DOSed the forum.



  • @gonzopancho:

    And, of course, today someone DOSed the forum.

    It ain't no big thing.  We can wait for their adolescent temper tantrum to be over.  That's just part of living with 6+ billion spoiled adolescent brats.

    The pfSense forums use of Project Honey Pot has just be validated.


  • Banned

    @gonzopancho:

    And, of course, today someone DOSed the forum.

    That of course was extremely mature and not primitive at all…  ;D ::)



  • I didn't notice the DOSing…  Was the site down for .64 seconds or something?



  • @Quantum`:

    Wow, I am surprised and disappointed with the elementary security measures on the pfSense forum.

    You emailed me asking about why you couldn't reach the forum from your server. I replied asking what its IP is, and you replied you were actually talking about Tor. I replied that yes, often httpBL ends up with Tor exit nodes' IPs blocked because they're frequent sources of abuse, and that if it were easy to just exclude Tor exit nodes, I'd do it. We have no intention of blocking Tor, we just block IPs that are actively spamming and abusing things per httpBL.

    We're running anti-spam measures that are common to many, many websites. Anyone who's run a popular forum knows the onslaught of abuse you deal with. The anti-spam measures unfortunately have to go to great lengths to keep the site from being flooded with spam registrations and posts. It has nothing whatsoever to do with security.

    @Quantum`:

    If I were to put spam in the forum, is there no control?  Are there no moderators who could ban me?  Would a spam post upset things such that everyone is thrown off-balance and the world goes higgledy-piggldy, and nothing could be done about it?

    We'd rather not have to hire someone full time to sit here and clean up spam, which is truly what would be required without spam prevention measures that are painful at times for a tiny fraction of a percent of users. You've clearly never run a popular website that accepts user-submitted content of any type.

    Project Honeypot is actually really good at this type of thing, and a significant improvement from "Stop Forum Spam" that we used prior to switching over to it. SFS and many similar options leave IPs blacklisted for months or years past the last known malicious activity from that IP, so it ends up blocking tons of IPs in ISPs' dynamic IP pools that had a compromised machine months or years previously when it was assigned to a different customer. httpBL is configurable for how recently you care about abuse. We use 30 days, and a pretty high threshold for "badness", so only IPs that have been significantly malicious in the past 30 days are affected. Unfortunately, that catches Tor exit nodes from time to time. Outside of Tor exit nodes, it has a very low rate of false positives. We get maybe 1 complaint a month on average with false positives outside of Tor (generally IPs used by those behind CGN), and it blocks upwards of 2000 requests a day on average. And httpBL is willing to whitelist Tor exit nodes if you submit them.

    @Quantum`:

    Frankly I'm pretty put off at this point by the complete lack of any apparent knowledge or discussion of the actual technical characteristics of pfSense.

    If you want to talk about technical characteristics, start a thread asking about technical characteristics. If you want to create a shit storm, start a thread bitching about commonly employed spam prevention measures that are standard to any popular forum on the Internet that isn't overrun with spam.



  • I removed smites from those who got them in this thread.

    @kejianshi:

    I didn't notice the DOSing…  Was the site down for .64 seconds or something?

    About 3.5 hours actually, unless you're on IPv6. The IPv4 IP had to be null routed for a bit to keep everything else up, there wasn't enough coming in on v6 for it to matter so that stayed up. Blew out a 10 million state limit in no time. IPv6 and things other than the forum were hit and miss for roughly a half hour until the null route was put into place.



  • Thats it then - Yes.  I'm using IPV6, even on my VPNs.  I guess I wouldn't have noticed.
    Still - I doubt its related to this thread.  People have been talking about one particular SYN Flood attack for a while.
    Could have been anyone.



  • @kejianshi:

    Still - I doubt its related to this thread.  People have been talking about one particular SYN Flood attack for a while.
    Could have been anyone.

    Indeed, it could have been anyone. There is no solid indication of who is responsible. This thread's timing could just be a coincidence.

    I'm in contact with the guy in the other thread re: that SYN flood. There doesn't have to be anything "special" about it, blasting millions of new connections per second at any stateful firewall ends poorly. We now have a state limit in place on connections to the forum so if it happens again, it'll at least only take the forum down.


  • Moderator

    @cmb:

    Indeed, it could have been anyone. There is no solid indication of who is responsible. This thread's timing could just be a coincidence.

    "According to Verisign's latest Distributed Denial of Service Trends report, attacks can cost between $5 (USD) per hour or as low as $2 (USD) an hour. In addition, massive and longstanding attacks can be launched for as little as $800 a month."

    http://www.securityweek.com/ddos-hire-services-cheap-effective


Log in to reply