> On Mar 30, 2024, at 13:03, Rich Brown via Bloat
> wrote:
>
> Hi folks,
>
> This note was prompted by a question from the crusader github repo [1] where
> I wrote the following:
>
>>> It seems to me that the server netperf.bufferbloat.net (also called
>>> netperf-east.bufferbloat.net) has
Hi Rich,
Sure, here's what we did to protect our Netperf servers: Require a password to
run netperf (it's a command line parameter on the client), and rotate the
password regularly.
This means users will need to sign up for access, and get an email every time
the password is rotated. That
Hi folks,
This note was prompted by a question from the crusader github repo [1] where I
wrote the following:
>> It seems to me that the server netperf.bufferbloat.net (also called
>> netperf-east.bufferbloat.net) has been down for quite a while.
>
> Yes. I have been stymied by heavy abuse of t