I'm blocking connections from AWS to my on-prem services
The article discusses the balkanization of the internet due to large cloud providers, emphasizing commercialization, isolated ecosystems, and the need for accountability and improved management practices to prevent fragmentation.
Read original articleThe article discusses the emergence of a balkanized internet, largely influenced by the dominance of large cloud providers. It traces the history of the internet from its inception, highlighting the transition from a government-controlled network to a commercialized one. The author notes that the commercialization led to a model based on advertising and the sale of user data, which has been exacerbated by the rise of AI technologies that utilize vast amounts of user-generated content. The piece critiques the current state of cloud services, suggesting that they create isolated ecosystems that view the broader internet as an external resource. The author shares personal experiences of blocking AWS access to their servers as a response to excessive traffic and abuse, emphasizing the need for better accountability and transparency from large cloud providers. The article concludes with a call for improved practices in managing internet resources to prevent further fragmentation and to ensure that users are aware of the implications of relying on these dominant services.
- The rise of large cloud providers is contributing to a fragmented, balkanized internet.
- The commercialization of the internet has shifted focus to advertising and user data monetization.
- Cloud services create isolated ecosystems that limit interaction with the broader internet.
- Personal experiences highlight the need for better accountability from cloud providers.
- Improved management practices are necessary to prevent further fragmentation of internet resources.
Related
The Death of the Web
The internet's evolution from creative individual websites to commercial dominance is discussed. Optimism for global unity and knowledge sharing shifted to profit-driven strategies, concentrating traffic on major platforms, altering user experience.
Protocols, Not Platforms: A Technological Approach to Free Speech
Internet platforms struggle with managing free speech, privacy, and disinformation. Criticism includes hate speech, censorship, foreign interference, and propaganda. Advocates propose using open protocols to empower users, foster competition, innovation, and privacy, and create new business models.
Ask HN: Will peer to peer services overtake centralised corporations?
The discussion emphasizes the dominance of centralized internet services, questioning the future emergence of peer-to-peer alternatives and expressing a desire for more decentralized, individual-driven online services.
Why Technological Progress Is Now Reversing
The article discusses the disconnect between technological advancement and societal benefit, highlighting issues like user exploitation, lack of accountability, and the need for reevaluating technology's societal role.
With Power Comes Great Responsibility Platforms Want to Be Utilities (2021)
Tech giants have created user dependency through opaque account termination processes and laws favoring corporate interests. Advocates seek transparency in moderation and "information fiduciary" rules to protect consumer rights.
https://docs.aws.amazon.com/vpc/latest/userguide/aws-ip-rang...
https://www.microsoft.com/en-us/download/details.aspx?id=565...
https://support.google.com/a/answer/10026322?product_name=Un...
etc etc...
I find it a shocking that people still expose internal web services (e.g. Gitlab) openly to the Internet, in my opinion you should at least have one additional layer of protection through a VPN or similar mechanism so that your services aren't discoverable from the public Internet.
I only expose SSH from a single bastion host, which is the only host that's publicly reachable, something that I'd like to get rid off in the future as well by adding a VPN layer on top.
As far as I noticed, ping with a spoofed source address is the only actual abuse mentioned in the article. It should go without saying that you can't tell if a spoofed ping packet came from AWS, because the source address is the address the spoofer wants you to send a reply to, not the spoofer's address. And a much less invasive mitigation would be rate-limiting pings to, say, 10 per second.
While the Internet is becoming balkanized this is mostly because of social media siloing itself to generate advertising and data revenue and to extract profit from AI training data (e.g. the Reddit/Google exclusivity deal) rather than because of providers blocking IP ranges.
I certainly don't understand the rational mindset behind blocking certain providers over some pings and then complaining about IP connectivity becoming balkanized. The balkanization is caused by the ones doing the blocking.
All that said, it's trivial to use proxies or VPNs to bypass any blocks.
The desire to limit the noise and only allow a "small circle of friends" is also appealing.
But I do that for specific services, not my domains in general. Mumble server: only open to the 3-4 countries that my friends are in, and none of the 'cloud providers'. Tech blog: world+dog can see it.
I am firmly in the 'We all benefit from shared knowledge' camp. So if my notes on modem init strings for my 300-baud C64 modem can help one other person; they won't go through the same pain I went through, and the world will be a better place.
I get the desire, for many reasons. That's cool. You do you.
Maybe I'm missing something obvious, but if the author believes the ping traffic is being spoofed, how could they know AWS is the source?
Data scraping? DDOS attacks? Bandwidth trouble? Security?
I don't think anyone will miss my stuff if they're part of the small minority of people accessing the internet through a VPN hosted in large data centres.
The biggest challenge for implementing this will probably be figuring out how to block inbound connections but keep outbound connections working. I'm sure there's a good nftables rule I can come up with eventually.
I opted for CIDR aggregation and rate limiting of data center ISPs in nginx for one of my frontends. There are reasonable limits for normal IPs too. Not all of us have the capacity or desire to scale.
This isn't a technical problem, it's a legal/social problem.
I'm going to going out on a limb and guess that all of this traffic that isn't related directly to AWS, but its customers. You can set PTRs for your allocated elastic IPs with a request to support. But then again nobody is going to do it because... it doesn't matter. It may have mattered when you were hosting with a block that you actually truly owned, before the ICANN times, but no more. No one cares. Everything is ephemeral, so why should the reverse matter when things get cycled through addresses multiple times per day? If you're seeing excessive anything, then it's probably time to reach out to the abuse contact published in the whois. Let me help you with that:
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbuseEmail: trustandsafety@support.aws.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Use modern features built in to modern versions of common packages and products: rate limiting, redirects, filters, and on and on. If you're just blocking to block to make some sort of statement into the void, you're just hastening that balkanization.What precisely is his problem with Amazon?
Related
The Death of the Web
The internet's evolution from creative individual websites to commercial dominance is discussed. Optimism for global unity and knowledge sharing shifted to profit-driven strategies, concentrating traffic on major platforms, altering user experience.
Protocols, Not Platforms: A Technological Approach to Free Speech
Internet platforms struggle with managing free speech, privacy, and disinformation. Criticism includes hate speech, censorship, foreign interference, and propaganda. Advocates propose using open protocols to empower users, foster competition, innovation, and privacy, and create new business models.
Ask HN: Will peer to peer services overtake centralised corporations?
The discussion emphasizes the dominance of centralized internet services, questioning the future emergence of peer-to-peer alternatives and expressing a desire for more decentralized, individual-driven online services.
Why Technological Progress Is Now Reversing
The article discusses the disconnect between technological advancement and societal benefit, highlighting issues like user exploitation, lack of accountability, and the need for reevaluating technology's societal role.
With Power Comes Great Responsibility Platforms Want to Be Utilities (2021)
Tech giants have created user dependency through opaque account termination processes and laws favoring corporate interests. Advocates seek transparency in moderation and "information fiduciary" rules to protect consumer rights.