[Dxspider-support] $DXProt::senderverify = '2'

Dirk Koopman djk at tobit.co.uk
Wed Feb 19 15:33:22 GMT 2025


On 19/02/2025 14:43, g4piq--- via Dxspider-support wrote:
> The flooding at the weekend clearly caused some nodes real problems. 
>  But I think that's a different behaviour to spots being sourced from 
> nodes that for we haven't got up to date user lists for (many reasons 
> for that in this complex heterogeneous network). The flooding at the 
> weekend feels like it could be prevented with a different mechanism - 
> for example an incoming rate limit on spots with the same call or from 
> the same IP.

The problem is not the backbone traffic. As Kin (I think) observed this 
last weekend, even on his fairly large node(s), and running on 
Linux(like) operating systems, spots only take 20-40mS to distribute 
(after filtering) to all interested connections. Other software seem to 
take significantly longer. I have seen figures of 4 or 5 minute delay 
this last week. I have also had reports that running a large node on 
Windows is significantly slower (hint hint). As well as hosting services 
that use network attached storage and not real disks. When WA9PIE-2 
(usually 700+ daily users -> 1200 on contest weekends) swapped from 
Google services to a DO droplet, it too went from 2 or 3 minute lags to 
a few mS to process and distribute protocol sentences.

I believe that a many of these rogue spots, that seem to be valid, are 
sent by software that "snipes". This means that authenticating them is 
always going to be rather patchy. By default, DXSpider strongly 
discourages this practice and will not pass on spots (or whatever) from 
callsigns/software that does this. It would be nice if we could identify 
all the user software that implements this and try to persuade the 
authors not to allow it. I struggle to understand what "sniping" gives 
the user. Is this some attempt at misdirection? Why? What advantage is 
there?

So, what is going to happen?

There will be rate limiting, temporary and/or permanent black holing of 
repeat offenders. Having looked at the patterns of offending traffic, I 
can see one or two other little heuristical wrinkles I can add. I will 
continue to do this. There are also some protocol enhancements that I am 
toying with that may help.

But the real solution is to unmask offenders and persuade them to stop 
doing this. The alleged perpetrators appear to be known and apparently 
come from Italy.  I therefore ask our Italian sysops whether they can 
bring some more official pressure to bear, perhaps through their 
licencing authority. Not that this is a permanent solution, you don't 
actually have to have a licence to use the cluster or the software than 
runs or connects to it. But it might give someone pause before doing it 
again.

Since this is probably wishful thinking, I propose to carry on adding 
more protections and, in the meantime: let's just ignore it.

73 Dirk G1TLH
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.tobit.co.uk/pipermail/dxspider-support/attachments/20250219/85877093/attachment.htm>


More information about the Dxspider-support mailing list