💾 Archived View for rawtext.club › ~sloum › geminilist › 001685.gmi captured on 2020-09-24 at 01:43:05. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
Sean Conner sean at conman.org
Mon Jun 15 03:23:20 BST 2020
- - - - - - - - - - - - - - - - - - -
It was thus said that the Great defdefred once stated:
On Sunday, June 14, 2020 3:22 AM, Sean Conner <sean at conman.org> wrote:
[3] http://boston.conman.org/2019/07/09-12
http://boston.conman.org/2019/08/06.2
Should we deduce that a significative part of the internet traffic is fake request?
That a shame concidering the environmental impact of the digital world.
Maybe blocking all this non-human request is the solution?
Okay, how does one detect fake requests vs. legitimate requests? Way backin 2006 when I was paid to do this type of work, I set up a tarpit [1] withthe idea of maybe using the information gathered from it to block unwantedtarffic. Unfortunately, had I set this up, we still would *receive* thepackets. To really have the effect you want, you need to block it *at thesource* and to do that would require cooperation with literally *hundreds*(if not a few thousand) other network operators.
My blog entry for January 26, 2006 [2] I noted having seen 107,287connection attempts over a 24-hour period. I didn't record the number ofunique IPs (which could give an indication of the number of networksinvolved) but that's still over one "reported incident" per second.
After awhile, it just beomces background noise you learn to ignore.
-spc
[1] https://en.wikipedia.org/wiki/Tarpit_%28networking%29
[2] http://boston.conman.org/2006/01/26.3