#soylent | Logs for 2025-09-22
« return
[01:00:13] -!- bender has quit [Remote host closed the connection]
[01:00:23] -!- bender [bender!bot@Soylent/Bot/Bender] has joined #soylent
[01:01:47] -!- Loggie [Loggie!Loggie@Soylent/BotArmy] has joined #soylent
[07:20:53] <halibut> I figured that submission I spoke of earlier was probably typical spam. I imagine it gets very tiresome, but it was my first time seeing it, and I thought it was pretty amusing (again, for a first time).
[08:51:18] -!- systemd has quit [Ping timeout: 244 seconds]
[08:53:22] -!- chromas has quit [Ping timeout: 244 seconds]
[09:53:08] -!- chromas [chromas!~chromas@Soylent/Staph/Infector/chromas] has joined #soylent
[09:53:08] -!- mode/#soylent [+v chromas] by Imogen
[09:54:51] -!- systemd [systemd!~systemd@pid1] has joined #soylent
[09:58:07] <chromas> one of the ISPs had to string up new fiber yesterday, then last night, I saw another out with some trucks. Then I lost connection only to SN, so it must have been a very specific fiber cut...or clogged with bird droppings or something
[09:59:50] <fab23> 🙀
[10:03:09] <chromas> oh right I should be yapping here now
[11:03:51] <fab23> chromas: now my irc monitoring bot is not able to connect any more
[11:07:53] <chromas> I guess we're taking turns
[11:09:14] <fab23> we probably have to wait until US west is awake
[11:09:27] <chromas> should be 7 there by now
[11:09:46] <fab23> that is way too early :)
[11:09:56] <chromas> oh I remember US West but I think they got renamed Qwest
[11:10:21] <chromas> no idea who runs the phones now
[11:11:14] <fab23> Pacific Bell (maybe), don't know any more, it is 2.6 decades ago when I was last time there.
[11:12:57] <chromas> oh derp
[11:13:10] <chromas> you said west but I was picturing east
[11:13:14] <chromas> west is 4 here
[11:13:23] <fab23> :)
[11:13:29] <fab23> time zones are a mess
[11:13:57] <chromas> us customary west vs metric west
[11:15:35] <fab23> from my point of view the whole American continent is in the west :)
[11:28:09] <chromas> but also in the east
[11:48:10] <fab23> stupid globe, makes everything complicated :)
[13:32:27] <Ingar> that's why you have to become a flat earther
[13:32:37] <Ingar> squares as simpler than globes
[13:33:02] <Ingar> (actually they aren't but that would require because understanding of maths)
[13:33:13] <Ingar> s/because/basic/
[13:40:58] -!- c0lo [c0lo!~c0lo@124.190.mg.jlq] has joined #soylent
[13:41:08] <c0lo> https://www.404media.co
[13:41:09] <systemd> ^ 03'A Black Hole of Energy Use': Meta's Massive AI Data Center Is Stressing Out a Louisiana Community
[13:41:16] <c0lo> =sub https://www.404media.co
[13:41:17] <systemd> ✓* Sub-ccess! "03'a Black Hole of Energy Use': Meta's Massive AI Data Center is Stressing Out a Louisiana Community" (53p) -> https://soylentnews.org
[14:38:10] <kolie> fab23, good now?
[14:52:36] <fab23> kolie: no, TCP connections still fail from e.g. my monitoring to port 443 and others, but ICMP (ping) works
[15:00:42] <fab23> kolie: see https://scratchy.ponz.ch TCP seem to reach the host, but then is for whatever reson not able to connect, but it works from other locations.
[15:00:47] <systemd> ^ 03PONZ IRC: tcptraceroute www.soylentnews.org 443
[16:06:38] <kolie> weird cause the top one shows it hitting the hosts
[16:06:39] <kolie> mx.soylentnews.org (192.163.30.227) 157.189 ms 156.896 ms 157.002 ms
[16:07:12] <kolie> whats the source IP?
[16:07:19] <kolie> I think you might have gotta firewalled.
[16:09:45] <kolie> actually idk
[16:09:52] <kolie> but it looks like it hits the host so idk.
[16:16:58] <fab23> kolie: but the port is not open, see the example below where the port does answer.
[16:17:47] <fab23> kolie: see query for host/ip
[16:18:43] <kolie> its firewalled.
[16:19:03] <fab23> 🙀
[16:19:47] <kolie> someone on the same /16
[16:19:52] <kolie> was doing php requests.
[16:20:16] <fab23> kolie: it is out of Hetzner, so there may be crawlers as well :(
[16:20:21] <kolie> So basically we blocked a large chunk of hetzner yea.
[16:20:28] <kolie> It was a day ban.
[16:22:04] <Ingar> I remember HEtzner and their mysterious floods of traffic
[16:22:07] <fab23> for IPv6 it started about 18 hours ago, and for IPv4 around 6 hours
[16:24:08] <fab23> IPv4 is open again, but IPv6 still blocked
[16:47:37] -!- halibut has quit [Remote host closed the connection]
[17:05:18] <kolie> Yea fab23, both were blocked, a /16 and a /32 of v6
[17:05:21] <kolie> so pretty broad.
[17:39:57] <fab23> evil firewall, but looks fine now
[17:43:15] -!- halibut [halibut!~halibut@CanHazVHOST/halibut] has joined #soylent
[18:05:18] -!- halibut has quit [Remote host closed the connection]
[18:09:10] -!- halibut [halibut!~halibut@CanHazVHOST/halibut] has joined #soylent
[22:56:04] <fab23> kolie: IPv6 is blocked again from Hetzner :-(
[23:05:31] <halibut> Side note in case anybody is interested: At least some traceroute programs support a -T option to do a TCP traceroute. I do not know for sure, but do not think tcptraceroute offers anything over that.
[23:07:12] <kolie> yea hetzner has a lot of spammers apparently ><
[23:08:09] <fab23> halibut: on Debian the tcptraceroute does just traceroute with options, see https://scratchy.ponz.ch
[23:08:14] <systemd> ^ 03PONZ IRC: tcptraceroute www.soylentnews.org 443
[23:08:57] <fab23> kolie: then please put my two monitoring IPs on welcomelist
[23:12:19] <halibut> Interesting. I was looking at this project: https://github.com
[23:12:20] <systemd> ^ 03GitHub - mct/tcptraceroute: A traceroute implementation using TCP packets
[23:12:42] <halibut> I am sure distro-specific variants of common utilities is something we need more of.
[23:12:52] <halibut> On Debian, is it a shell script or something?
[23:18:34] <fab23> yes, seems to be part of the traceroute pkg
[23:19:38] <fab23> halibut: the shell script mention this:
[23:19:43] <fab23> # Shell wrapper providing tcptraceroute(8) command line interface.
[23:19:45] <fab23> #
[23:19:47] <fab23> # The original implementation of tcptraceroute(8) can be obtained
[23:19:49] <fab23> # from http://michael.toren.net
[23:19:51] <fab23> y
[23:25:51] <halibut> Interesting.