L’article publié par la société Cloudflare explique que les robots du service d’intelligence artificielle Perplexity utilisent des méthodes pour cacher qu’elle parcourent les sites web pour récupérer des informations. En changeant souvent leur « user agent » (l’identifiant qui indique normalement quel navigateur ou robot visite un site) et en utilisant différentes adresses IP et réseaux internet, Perplexity essaie d’éviter les blocages mis en place par les sites web qui ne veulent pas être visités par leurs robots.
@landley @jschauma @ryanc @0xabad1dea yeah, the exhaustion problem would've been shoved back with a #64bit or sufficiently delayed by a 40bit number.
Unless we also hate #NAT and expect every device to have a unique static #IP (which is a #privacy nightmare at best that "#PrivacyExtensions" barely fixed.)
I guess using a #128bit address space was inspired by #ZFS doing the same before, as the folks who designed both wanted to design a solution that clearly will outlive them (way harder than COBOL has outlived Grace Hopper)...
If I was @BNetzA I would've mandated #DualStack and banned #CGNAT (or at least the use of CGNAT in #RFC1918 address spaces) as well as #DualStackLite!
Today a /16 network (65536 IP addresses) is a VERY valuable asset worth around $3m💰! Here we have seven of them announced on the Internet by unallocated ASNs - it is almost unbelievable: 😱
144.74.0.0/16 AS25978 [rush.edu, US]
146.131.0.0/16 AS23448 [epcor.com, CA]
152.5.0.0/16 AS11540 [rti.org, US]
159.113.0.0/16 AS16860 [wipro.com, IN ... even the IPs are unallocated!]
162.121.0.0/16 AS19708 [stlukeshealth.org, US]
179.18.0.0/16 AS22698 [wom.co, CO]
197.12.0.0/16 AS37703 [atlax.com, TN]
Using unallocated ASNs is a common cybercriminals trick. To prevent network reputation degradation, @arin @Rush University Medical Center @epcor @RTI International @wipro @ST. Luke's Health System @WOM Colombia @Atlax Web Solutions @lacnic @afrinic we strongly recommend fixing this 🙏!
Example of #Blocking #ASNs (https://en.wikipedia.org/wiki/Autonomous_system_(Internet)) with #opnsense:
Head to the #Firewall section
1. Create a new alias
Name: "ASN_Google_IPv4"
Type: "BGP ASN"
Content: The plain ASN number 15169 (#Google)
Give a description
2. Create a floating rule
Rule category: Floating
Action: Block
Interface: LAN/WAN
Direction: Any
TCP Version: IPv4
Protocol: any
Destination: ASN_Google_IPv4
Logging as desired
Lookup ASNs:
https://securitytrails.com/blog/asn-lookup
Are there any #freedomRespecting #whois servers/databases?
The https://whois.radb.net one is good but it seems to not feature #AsiaPacific ASNs for some strange reason.
In a global community, we need those too.
#whois #whoisFoss #whoisFreedom #freeToKnow #freeKnowledge #sciHub #whoisServer #whoisDatabase #ASNumbers #ASN #ASNs #RadB