On Wed, Jan 15, 2003 at 01:36:12PM -0500, Dominic Anello wrote: > Hello, I'm having two problems relating to running a public Freenet > proxy that I was hoping that you folks could help me with. I'm running > build 650 under linux with the 1.3 JVM from IBM. > > The first is that I can't seem to be able to get mainport/fproxy to be > consistently public. The mainport servlet is bound on 0.0.0.0:8888: > > [danello at groovy ~/fred/dist]$ netstat -nlp | egrep ':8888 .*LIST' > tcp 0 0 0.0.0.0:8888 0.0.0.0:* LISTEN 3 2101/java > > I have: > mainport.bindAddress=* > mainport.allowedHosts=0.0.0.0/0 > mainport.port=8888 > in freenet.conf, but I keep getting messages like this in my log file: You need to set publicNode=true. This will disable the Node Status Servlet, which contains information that probably shouldn't be public, and some very VERY slow loading files (the datastore histogram for example) that could quickly overload your node if pulled repeatedly. > > 2003-01-15 11:06:30.601 (freenet.interfaces.LocalInterface, Interface # > tcp/8888):MINOR: Rejected connection: host not allowed: 192.107.146.2:33385 No idea... running it on logLevel=DEBUG might give us some more useful info. > 2003-01-15 11:20:46.688 (freenet.interfaces.LocalInterface, Interface # > tcp/8888):MINOR: Accepted connection: tcpconnection: 66.92.65.123:3317 > 2003-01-15 11:36:41.791 (freenet.interfaces.LocalInterface, Interface # > tcp/8888):MINOR: Accepted connection: tcpconnection: 66.196.72.53:48166 > > As you can see, it's definitely allowing external traffic, but some IPs > are inexplicably banned. I've also tried mainport.allowedHosts=* with > the same result. > > The other question is: > Could fproxy/mainport be modified to return a robots.txt that excludes > all bots? I noticed my load was staying pegged at 100, so I ran a > tcpdump and it looks like I'm being spidered: We DO serve a robots.txt. Try it - wget http://groovy.danky.com:8888/robots.txt A few of the bits and pieces in Node Status might cause excess load, if they were repeatedly hammered...
No idea about the load issue... is this thread overload or routingTime overload (look at the Performance infolet)? I put some code in the unstable branch a few days ago that limits incoming fproxy connections... > > 08:38:31.319040 66.196.65.24.43761 > groovy.danky.com.8888: P0:180(180) > ack 1 win 32850 (DF) > 0x0000 4500 00dc 53aa 4000 ed06 fef5 42c4 4118 E...S. at .....B.A. > 0x0010 422d 7472 aaf1 22b8 2972 1a52 119b f3dd B-tr..".)r.R.... > 0x0020 5018 8052 6be2 0000 4745 5420 2f72 6f62 P..Rk...GET./rob > 0x0030 6f74 732e 7478 7420 4854 5450 2f31 2e30 ots.txt.HTTP/1.0 > 0x0040 0d0a 486f 7374 3a20 6772 6f6f 7679 2e64 ..Host:.groovy.d > 0x0050 616e 6b79 2e63 6f6d 0d0a 4163 6365 7074 anky.com..Accept > 0x0060 3a20 2a2f 2a0d 0a55 7365 722d 4167 656e :.*/*..User-Agen > 0x0070 743a 204d 6f7a 696c 6c61 2f35 2e30 2028 t:.Mozilla/5.0.( > 0x0080 536c 7572 702f 7369 3b20 736c 7572 7040 Slurp/si;.slurp@ > 0x0090 696e 6b74 6f6d 692e 636f 6d3b 2068 7474 inktomi.com;.htt > 0x00a0 703a 2f2f 7777 772e 696e 6b74 6f6d 692e p://www.inktomi. > 0x00b0 636f 6d2f 736c 7572 702e 6874 6d6c 290d com/slurp.html). > 0x00c0 0a46 726f 6d3a 2073 6c75 7270 4069 6e6b .From:.slurp at ink > 0x00d0 746f 6d69 2e63 6f6d 0d0a 0d0a tomi.com.... > > I could firewall them out individually, but it'd be nice if the > well-behaved ones could be automatically excluded. > > Thanks for your attention, > -Dominic > > -- > Current soundtrack @ 01/15/03 08:37 'Alice In Chains - Dirt - 05 - > Sickman' > Freenet Ref: http://danky.com/groovy.danky.com.ref > Get Freenet: http://groovy.danky.com:8891/Fp13tdrsxZI/ > PGP Key: http://danky.com/keys/danello.pgp -- Matthew Toseland toad at amphibian.dyndns.org/amphibian at users.sourceforge.net Freenet/Coldstore open source hacker. Contracted full time by Freenet Project Inc. http://freenetproject.org/ ICTHUS. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20030115/74ee40c2/attachment.pgp>
