Replies: 5 comments 5 replies
-
I fear that we could block valid users too. |
Beta Was this translation helpful? Give feedback.
-
After receiving annoying spam text several times in our server, I reached out to the alleged sender who claimed to be recording and offered false ways to prevent the annoyance. I now understand, from a pleasant email reply, that the alleged sender is also a victim of these "attacks". Our musicians would really appreciate a method of blocking this on our Linode-hosted Ubuntu server. |
Beta Was this translation helpful? Give feedback.
-
Thanks. I just operate a server. These technical terms are probably for developers not users like me suffering the invasion. |
Beta Was this translation helpful? Give feedback.
-
Update: The threat actor began "outrage farming" about a week ago, spamming chats of active servers and attributing the spam to me. I know the threat actor's networks because he has attacked my servers persistently over two years. I see this as a hardening opportunity, so I haven't said much about it in this forum. However, this new phase of provocative chat spamming crosses a line by seeking to hurt a much larger audience, while operating in an unblockable way using multiple IP addresses, listed above as attack vectors 1 and 4. Based on @ann0see 's concern about blocking valid users, I began examining all traffic reaching public servers from the 8 networks routinely used by this threat actor. Today I found a Filipino pianist/drummer who uses one of the networks. He said his latency is 250ms without the VPN, and just 50ms with it, so the VPN bypasses bad routes. This makes blocking entire networks more risky, but it also reveals which commercial VPN the threat actor might use. One interesting detail: "I snatched a lifetime deal a few years ago with them." If the threat actor also has a low-price lifetime deal, it would be sad if they lost it for abusing people at scale. Have Jamulus operators approached VPNs in the past seeking to stop abusive behavior? |
Beta Was this translation helpful? Give feedback.
-
Thanks MFCNORD. I don't understand the weird way a Linode host firewall blocks IPs with Jamulus (it is certainly not immediate and it perhaps makes the server invisible in the list of servers?). As valid users don't use VPN for Jamulus, I'd love to try and block the VPN provider's entire range if we can identify it/them. Last night I noticed no such "attack" so possibly it is being done manually on busy servers rather than routinely? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I believe our community is Jamulus’s most compelling feature. Ease-of-use is very compelling, reliability is very compelling, but ease of collaboration with strangers, especially over a long time frame (both in hours and years), is the strongest, most compelling feature and differentiator for us.
The geographically diverse, long-running servers provided by our volunteers are a key ingredient of that feature.
Over about a year, I have observed the development of code that can:
If used maliciously, this code represents an existential threat to our public community.
Thankfully, we can eliminate most of this threat.
Most malicious code reaches our servers from "anonymizing" networks like Tor or VPNs. These networks provide many unique IP address subnets, and are often used for abuse and evasion, but they all come with high latency, so they’re never used by genuine musicians for music-making.
By excluding ASNs known to support anonymized traffic, we can dramatically reduce the risks posed by malicious connections.
Beta Was this translation helpful? Give feedback.
All reactions