Attached: 2 images
Holy shit.
The Russian gov send in an abuse request for the @Bellingcat to be removed from mstdn.social :amaze:
I am not gonna comply, and have replied to Hetzner
No way I'm gonna let the evils of the gremlin dictate stuff on anything I host
UPDATE: Hetzner ignores their requests and we're in the clear: https://mstdn.social/@stux/113662573364116275
Pretty simple simple ‘castle & moat’ setup. Lots of firewall, IPS, dynamic threat, etc around it with separate subnets and all the usual biz. My ISP doesn’t use CGNAT so I’m lucky that way, though they did question WTF I was doing last I made a service call to them based on the bandwidth usage.
All service providers in the EU have to follow a similar abuse report handling procedure.
They usually require a response to abuse tickets within 24h, so better have someone capable of responding at least twice a day. Unless the abuse goes against the provider’s ToS (don’t do that), simply responding to it should make it go away… as in, the provider washes their hands and lets the reporting party and you sort it among yourselves, be it in court or whatever. Russian government agencies are not very likely to win a case in the EU these days, though.
If you don’t want to deal with hosting providers, you can self-host and deal with your ISP.
This varies a lot from one ISP to another, some will cut you off at the first sign of abuse, others will ignore abuse reports like nothing happened, while others will port-filter you so you can’t even host stuff yourself. You will also find that most residential IP ranges are on blacklists used by mail providers.
To increase the likelihood of staying online, use redundancy. For a while, I used to manage a system with two hosting providers, acting as reverse proxies and fallback for a local dual server setup with dual PSUs, dual UPSs, with dual connections to two ISPs via two routers. We used to get close to “six 9s” uptime.
Just curious, but what would be a good choice, or where would one look for it?
I tend to find the R820 behind me to be a pretty reliable host so long as you don’t mind footing the power bill to run it.
Which network setup do you use? Use a VPN tunnel with 1:1 NAT, route a subnet? Something else?
Pretty simple simple ‘castle & moat’ setup. Lots of firewall, IPS, dynamic threat, etc around it with separate subnets and all the usual biz. My ISP doesn’t use CGNAT so I’m lucky that way, though they did question WTF I was doing last I made a service call to them based on the bandwidth usage.
All service providers in the EU have to follow a similar abuse report handling procedure.
They usually require a response to abuse tickets within 24h, so better have someone capable of responding at least twice a day. Unless the abuse goes against the provider’s ToS (don’t do that), simply responding to it should make it go away… as in, the provider washes their hands and lets the reporting party and you sort it among yourselves, be it in court or whatever. Russian government agencies are not very likely to win a case in the EU these days, though.
If you don’t want to deal with hosting providers, you can self-host and deal with your ISP.
This varies a lot from one ISP to another, some will cut you off at the first sign of abuse, others will ignore abuse reports like nothing happened, while others will port-filter you so you can’t even host stuff yourself. You will also find that most residential IP ranges are on blacklists used by mail providers.
To increase the likelihood of staying online, use redundancy. For a while, I used to manage a system with two hosting providers, acting as reverse proxies and fallback for a local dual server setup with dual PSUs, dual UPSs, with dual connections to two ISPs via two routers. We used to get close to “six 9s” uptime.
I guess no hoster is safe, but maybe have a backup in a different jurisdiction.
I’m not sure which companies are best for this use case.