Re: Re: Vixie warns: DNS Changer ‘blackouts’ inevitable

2012-05-31 Thread cncr04s/Randy
On Thu, May 31, 2012 at 10:39 AM,   wrote:
> On Thu, 31 May 2012 08:14:40 -0500, "cncr04s/Randy" said:
>
>> Exactly how much can it cost to serve up those requests... I mean for
>> 9$ a month I have a cpu that handles 2000 *Recursive* Queries a
>> second. 900 bux could net me *200,000* a second if not more.
>> The government overspends on a lot of things.. they need some one whos
>> got the experience to use a bunch of cheap servers for the resolvers
>> and a box that hosts the IPs used and then distributes the query
>> packets.
>
> For $50/mo I can have a connection from Comcast.  That doesn't mean that
> I could run my own cable to the nearest major exchange for anywhere near
> $50.
>
> Also, what's the failover if your $9/mo CPU develops a bad RAM card?  Does
> your $9/mo CPU have sufficient geographic diversity to survive a backhoe?
> And about 4 zillion other things that people that actually have to run 
> production
> services worry about...

My comment was directed at government spending... no need to have such
a angry tone about the "comment". I was only comparing to what I spend
on my large volumes of queries and what this so called expensive stuff
the government is running... And I have never developed a bad ram
card, even if I did, replacements are easy as i'm talking about
distributed vps in this case.



Re: Vixie warns: DNS Changer ‘blackouts’ inevitable

2012-05-31 Thread cncr04s/Randy
On Mon, May 28, 2012 at 2:56 PM, Florian Weimer  wrote:
>
> [Dnschanger substitute server operations]
>
> > One thing is clear, Paul is able to tell a great story.
>
> PR for ISC is somewhat limited, it's often attributed to the FBI:
>
> | The effort, scheduled to begin this afternoon, is designed to let
> | those people know that their Internet connections will stop working
> | on July 9, when temporary servers set up by the FBI to help
> | DNSChanger victims are due to be disconnected.
>
>
> 
>
> | The FBI has now seized control of the malicious DNS servers, but
> | countless computers are still infected with the malware.
>
>
> 
>
> | The malware is so vicious — it can interfere with users' Web
> | browsing, steer them to fraudulent websites and make their computers
> | vulnerable to other malicious software — that the FBI has put a
> | safety net of sorts in place, using government computers to prevent
> | any Internet disruptions for users whose computers may be infected.
>
>
> 
>
> (I'm justing quoting what I found.  Some of the linked articles
> contain bogus information.)
>
> In any case, this isn't what bugs me about the whole process.  I don't
> like the way this is implemented—mainly the use of RPZ, but there are
> other concerns.  The notification process has some issues as well, but
> it's certainly a great learning exercise for all folks involved with
> this.  To me, it doesn't really matter that Dnschanger is fairly minor
> as far as such things go.  Hopefully, the knowledge and the contacts
> established can be applied to other cases as well.
>

Exactly how much can it cost to serve up those requests... I mean for
9$ a month I have a cpu that handles 2000 *Recursive* Queries a
second. 900 bux could net me *200,000* a second if not more.
The government overspends on a lot of things.. they need some one whos
got the experience to use a bunch of cheap servers for the resolvers
and a box that hosts the IPs used and then distributes the query
packets.