• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Notice To All Members Using Dnet Client

ViRGE

Elite Member, Moderator Emeritus
Guys, we need you to make sure that your Dnet clients are both up to date, and configured correctly.

For those of you using the TA pproxy, we've had to implement an auto-blacklist because of clients repeatedly hitting the machine, dragging it down in terms of connections. Right now, I'm looking at 2 dozen or so IP addresses that are banned for an hour because their clients kept hitting the Core at a ridiculous rate. Please check all your clients and make sure they're at least version 468, if not later than that, as the clients before that are a large source of the hits. If you're curious about what machines are ending up on this list, we'll have more information once we get email addresses attached to the IPs in question.

Also of note: please check your OGR stub count settings. We had a user with a pproxy download 5000 stubs last night, which kept us drained through the night(as getting stubs from Dnet is just as difficult for the same reasons). OGR stubs take far longer to process than even the largest RC5 WU's; if you want a number to work with, start with 10 stubs, and work from there. Those 5000 stubs will take a moderately sized herd months to process, and might go stale before that. Please only take the OGR stubs you need for now until we can get a steady flow of stubs.

Lastly, some good news. With RC5 over, we're tweeking the stat times on the TA Website so that OGR runs are more frequent. Right now, we're looking at having runs every 10 minutes, since OGR logs process so much faster. If you're not already using the TA PProxy, now is a good time to start; proxy.teamanandtech.com is open for buisness, accpeting connections on the normal port(2064) along with port 23. Stats are availible at http://www.teamanandtech.com/dnet/.

Thank you for your attention and support(and fixing your clients), and good luck to the TA OGR team.🙂
 
Geoffs, this is current as of the edited post time:

169.237.66.136 19 seconds
169.237.66.226 19 seconds
24.228.38.242 19 seconds
213.67.43.43 28 seconds
169.237.66.208 30 seconds
24.73.200.146 71 seconds
137.99.201.161 75 seconds
128.112.113.22 343 seconds
128.112.113.25 383 seconds
68.5.132.9 411 seconds
172.190.164.208 412 seconds
216.13.88.178 832 seconds
12.3.177.169 1138 seconds
128.112.113.46 1357 seconds
138.88.41.248 1485 seconds
195.184.33.68 2200 seconds
195.34.179.150 2339 seconds
68.12.41.184 2350 seconds
4.43.230.117 2481 seconds
64.118.131.51 2619 seconds
24.31.219.132 2738 seconds
128.112.112.73 2861 seconds
216.12.97.51 3222 seconds
128.112.112.142 3576 seconds
 
Guilty!

I'm running a lot of older clients and the two IP address I know of are on that list. In fact, one of them is the top one 😛

I'm getting it taken care of, but it'll be a couple days.... Keep me on the blacklist, most, if not all of my clients were configured to ONLY do RC5 so I'm not losing anything as far as OGR goes.

 
Please add 199.124.14.6 to the list, ViRGE. This one is hitting my pproxy hard and I have no way of stopping it. I think this is Slahr Dzhe's but not 100% sure. I've already posted this in another thread but I hope it gets more visibility here.
 
Bump... Ok, this is the latest list (IP / email / D.Net Alias / expire time):

128.112.112.142 syf3r@hotmail.com 831 seconds
128.112.113.22 syf3r@hotmail.com 993 seconds
128.112.113.46 syf3r@hotmail.com 680 seconds
128.112.115.195 syf3r@hotmail.com 1685 seconds
128.112.115.77 syf3r@hotmail.com 1872 seconds
162.127.176.84 crackinfool@yahoo.com CetiAlphaV 1299 seconds
169.207.185.210 jmadison@execpc.com Damaged 2720 seconds
169.237.66.136 namnguyen@ucdavis.edu 1400 seconds
169.237.66.208 namnguyen@ucdavis.edu 95 seconds
169.237.66.226 namnguyen@ucdavis.edu 1459 seconds
195.184.33.68 356 seconds
195.34.179.150 halangk@rost-ffm.de 861 seconds
209.44.5.33 pablo@netsight.net -11 seconds
213.67.43.43 thomas.landfors@swipnet.se ThomasL 1393 seconds
216.12.97.51 rerooks@hotmail.com 28 seconds
216.13.88.178 mscrivo@mail.com 2574 seconds
24.228.38.242 sinner@optonline.net Sinner 642 seconds
24.31.219.132 sjohnson2@sc.rr.com Team DVX 2435 seconds
24.73.200.146 biggles@gte.net 255 seconds
65.103.217.22 kkelson@micron.net 1342 seconds
67.39.37.108 jmadison@execpc.com Damaged 596 seconds
68.12.41.184 hershbj@okstate.edu 295 seconds

To add onto what ViRGE said about the auto-blacklist. If your bad D.Net client hits Core or the round robin (proxy. proxy23. or proxy80.)teamanandtech.com hostnames, it will block your IP for one hour. At which time it will reopen it. If it continues to hammer the proxy, it automatically loops. This afternoon I plan on notifying everyone listed above.

Thanks,
Brad..

 
Back
Top