Get the latest tech news

I'm blocking connections from AWS to my on-prem services


apologize for yet another digression. The direct result of bulletproof infrastructure / cloud providers which are "too big to fail" is the balkanized internet.

So basically: Al Gore didn't invent the internet, but he and Newt Gingrich decriminalized it, which is to say pried loose the Hatch Act's death grip and allowed some public access. The DNS server deserves a special technical mention because it uses UDP with fallback to TCP: it provides limited public access to security telemetry (you can taste it: dig @131.191.85.30 'fail2ban;*.keys.redis.athena.m3047' txt). I don't always paint within the lines, but I presently have 53 CIDRs which collectively represent all of the AWS address space which abuse targets / comes from; on the other hand at times I can see twice that number of temporary firewall rules.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of services

services

Photo of connections

connections

Photo of AWS

AWS

Related news:

News photo

Public clouds are 'dirty' about VMware's on-prem push, says Broadcom CEO Hock Tan

News photo

Public clouds are 'dirty' about VMware's on-prem push, says Broadcom CEO Hock Tan

News photo

AWS’s new HPC-as-a-service offering democratizes supercomputer access