[Dxspider-support] Network degradation
Kin
ea3cv at cronux.net
Thu Feb 27 07:22:19 GMT 2025
Hi,
After looking at yesterday's logs, it is again evident that all roads lead
to Rome.
Without digging too deep, you can clearly see that stations like the
following:
SN100IARU
HF100IARU
SP100IARU
IR0RRAI
HF95PZK
have the same behaviour: spoofing of the source node and IP.
It is true that Dirk's algorithm is working very well, but I think we should
start taking stronger measures. If a certain SES station is involved by the
methodology we already know, it should be blocked. It is possible that they
will take measures to prevent it.
This is going 'in crescendo'. It is becoming more and more necessary to go
to password-protected nodes for users and nodes in spot/ann transmissions,
excluding completely those that are not trustworthy.
Kin EA3CV
More information about the Dxspider-support
mailing list