routing oddness

When I see this kind of behaviour, I start to wonder… WTF?

[LAN access from remote] from 5.231.68.67:52711 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:48
[LAN access from remote] from 5.231.68.67:52590 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:46
[LAN access from remote] from 5.231.68.67:51605 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:33
[LAN access from remote] from 5.231.68.67:51404 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:31
[LAN access from remote] from 5.231.68.67:51210 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:28
[LAN access from remote] from 5.231.68.67:50997 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:25
[LAN access from remote] from 5.231.68.67:50789 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:22
[LAN access from remote] from 5.231.68.67:50569 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:19
[LAN access from remote] from 5.231.68.67:50469 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:17
[LAN access from remote] from 5.231.68.67:50356 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:15
[LAN access from remote] from 5.231.68.67:50187 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:13
[LAN access from remote] from 5.231.68.67:49924 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:09
[LAN access from remote] from 5.231.68.67:49767 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:06
[LAN access from remote] from 5.231.68.67:49679 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:05
[LAN access from remote] from 5.231.68.67:49574 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:03
[LAN access from remote] from 5.231.68.67:49407 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:21:01
[LAN access from remote] from 5.231.68.67:49285 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:59
[LAN access from remote] from 5.231.68.67:49166 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:58
[LAN access from remote] from 5.231.68.67:49027 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:56
[LAN access from remote] from 5.231.68.67:48875 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:54
[LAN access from remote] from 5.231.68.67:47432 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:35
[LAN access from remote] from 5.231.68.67:47266 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:31
[LAN access from remote] from 5.231.68.67:47073 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:29
[LAN access from remote] from 5.231.68.67:46950 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:27
[LAN access from remote] from 5.231.68.67:46816 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:26
[LAN access from remote] from 5.231.68.67:46713 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:25
[LAN access from remote] from 5.231.68.67:46594 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:23
[LAN access from remote] from 5.231.68.67:46475 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:22
[LAN access from remote] from 5.231.68.67:46242 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:19
[LAN access from remote] from 5.231.68.67:46068 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:17
[LAN access from remote] from 5.231.68.67:45979 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:16
[LAN access from remote] from 5.231.68.67:45793 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:14
[LAN access from remote] from 5.231.68.67:45642 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:13
[LAN access from remote] from 5.231.68.67:45485 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:11
[LAN access from remote] from 5.231.68.67:45367 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:09
[LAN access from remote] from 5.231.68.67:45180 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:07
[LAN access from remote] from 5.231.68.67:44993 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:20:05
[LAN access from remote] from 5.231.68.67:44380 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:58
[LAN access from remote] from 5.231.68.67:44312 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:57
[LAN access from remote] from 5.231.68.67:44176 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:56
[LAN access from remote] from 5.231.68.67:44078 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:54
[LAN access from remote] from 5.231.68.67:43907 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:53
[LAN access from remote] from 5.231.68.67:43698 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:50
[LAN access from remote] from 5.231.68.67:42872 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:42
[LAN access from remote] from 5.231.68.67:42742 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:40
[LAN access from remote] from 5.231.68.67:42553 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:39
[LAN access from remote] from 5.231.68.67:42433 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:38
[LAN access from remote] from 5.231.68.67:42321 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:36
[LAN access from remote] from 5.231.68.67:42153 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:34
[LAN access from remote] from 5.231.68.67:42003 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:33
[LAN access from remote] from 5.231.68.67:41847 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:31
[LAN access from remote] from 5.231.68.67:41570 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:28
[LAN access from remote] from 5.231.68.67:41406 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:26
[LAN access from remote] from 5.231.68.67:41130 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:23
[LAN access from remote] from 5.231.68.67:40983 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:22
[LAN access from remote] from 5.231.68.67:40780 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:20
[LAN access from remote] from 5.231.68.67:40492 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:17
[LAN access from remote] from 5.231.68.67:40208 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:14
[LAN access from remote] from 5.231.68.67:40032 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:12
[LAN access from remote] from 5.231.68.67:39798 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:09
[LAN access from remote] from 5.231.68.67:39650 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:07
[LAN access from remote] from 5.231.68.67:39459 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:04
[LAN access from remote] from 5.231.68.67:39230 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:19:00
[LAN access from remote] from 5.231.68.67:39012 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:57
[LAN access from remote] from 5.231.68.67:38343 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:47
[LAN access from remote] from 5.231.68.67:38165 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:45
[LAN access from remote] from 5.231.68.67:37379 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:33
[LAN access from remote] from 5.231.68.67:36579 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:21
[LAN access from remote] from 5.231.68.67:36358 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:18
[LAN access from remote] from 5.231.68.67:36192 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:16
[LAN access from remote] from 5.231.68.67:36041 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:14
[LAN access from remote] from 5.231.68.67:35727 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:10
[LAN access from remote] from 5.231.68.67:35573 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:08
[LAN access from remote] from 5.231.68.67:35442 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:06
[LAN access from remote] from 5.231.68.67:35384 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:05
[LAN access from remote] from 5.231.68.67:35282 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:04
[LAN access from remote] from 5.231.68.67:35231 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:03
[LAN access from remote] from 5.231.68.67:35156 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:01
[LAN access from remote] from 5.231.68.67:35034 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:18:00
[LAN access from remote] from 5.231.68.67:34724 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:56
[LAN access from remote] from 5.231.68.67:34626 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:55
[LAN access from remote] from 5.231.68.67:34476 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:53
[LAN access from remote] from 5.231.68.67:34343 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:51
[LAN access from remote] from 5.231.68.67:34223 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:50
[LAN access from remote] from 5.231.68.67:34104 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:48
[LAN access from remote] from 5.231.68.67:33937 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:46
[LAN access from remote] from 5.231.68.67:33803 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:44
[LAN access from remote] from 5.231.68.67:33658 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:42
[LAN access from remote] from 5.231.68.67:33463 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:40
[LAN access from remote] from 5.231.68.67:33290 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:39
[LAN access from remote] from 5.231.68.67:33129 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:37
[LAN access from remote] from 5.231.68.67:32963 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:35
[LAN access from remote] from 5.231.68.67:32833 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:34
[LAN access from remote] from 5.231.68.67:60883 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:32
[LAN access from remote] from 5.231.68.67:60770 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:31
[LAN access from remote] from 5.231.68.67:60653 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:30
[LAN access from remote] from 5.231.68.67:60484 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:28
[LAN access from remote] from 5.231.68.67:60160 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:25
[LAN access from remote] from 5.231.68.67:60071 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:24
[LAN access from remote] from 5.231.68.67:59881 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:22
[LAN access from remote] from 5.231.68.67:59772 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:21
[LAN access from remote] from 5.231.68.67:59640 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:20
[LAN access from remote] from 5.231.68.67:59417 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:18
[LAN access from remote] from 5.231.68.67:59301 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:16
[LAN access from remote] from 5.231.68.67:59097 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:15
[LAN access from remote] from 5.231.68.67:58904 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:13
[LAN access from remote] from 5.231.68.67:58709 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:12
[LAN access from remote] from 5.231.68.67:58511 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:10
[LAN access from remote] from 5.231.68.67:58356 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:08
[LAN access from remote] from 5.231.68.67:58187 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:06
[LAN access from remote] from 5.231.68.67:58096 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:05
[LAN access from remote] from 5.231.68.67:58006 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:04
[LAN access from remote] from 5.231.68.67:57914 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:03
[LAN access from remote] from 5.231.68.67:57779 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:02
[LAN access from remote] from 5.231.68.67:57626 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:17:00
[LAN access from remote] from 5.231.68.67:57284 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:56
[LAN access from remote] from 5.231.68.67:56448 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:45
[LAN access from remote] from 5.231.68.67:56348 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:44
[LAN access from remote] from 5.231.68.67:56194 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:42
[LAN access from remote] from 5.231.68.67:56102 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:41
[LAN access from remote] from 5.231.68.67:55914 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:40
[LAN access from remote] from 5.231.68.67:55796 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:38
[LAN access from remote] from 5.231.68.67:55673 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:37
[LAN access from remote] from 5.231.68.67:55501 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:34
[LAN access from remote] from 5.231.68.67:55376 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:32
[LAN access from remote] from 5.231.68.67:55317 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:31
[LAN access from remote] from 5.231.68.67:54504 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:16
[LAN access from remote] from 5.231.68.67:54400 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:14
[LAN access from remote] from 5.231.68.67:54242 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:12
[LAN access from remote] from 5.231.68.67:54098 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:11
[LAN access from remote] from 5.231.68.67:54039 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:10
[LAN access from remote] from 5.231.68.67:53977 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:09
[LAN access from remote] from 5.231.68.67:53893 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:08
[LAN access from remote] from 5.231.68.67:53642 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:03
[LAN access from remote] from 5.231.68.67:53475 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:16:00
[LAN access from remote] from 5.231.68.67:53382 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:58
[LAN access from remote] from 5.231.68.67:53234 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:56
[LAN access from remote] from 5.231.68.67:53029 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:52
[LAN access from remote] from 5.231.68.67:52916 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:50
[LAN access from remote] from 5.231.68.67:52824 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:49
[LAN access from remote] from 5.231.68.67:52711 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:47
[LAN access from remote] from 5.231.68.67:52604 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:46
[LAN access from remote] from 5.231.68.67:52009 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:35
[LAN access from remote] from 5.231.68.67:51846 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:33
[LAN access from remote] from 5.231.68.67:51761 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:31
[LAN access from remote] from 5.231.68.67:51629 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:29
[LAN access from remote] from 5.231.68.67:51530 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:28
[LAN access from remote] from 5.231.68.67:51413 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:26
[LAN access from remote] from 5.231.68.67:51312 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:24
[LAN access from remote] from 5.231.68.67:51159 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:22
[LAN access from remote] from 5.231.68.67:51077 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:21
[LAN access from remote] from 5.231.68.67:50739 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:16
[LAN access from remote] from 5.231.68.67:50659 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:15
[LAN access from remote] from 5.231.68.67:50574 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:14
[LAN access from remote] from 5.231.68.67:50480 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:13
[LAN access from remote] from 5.231.68.67:50341 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:11
[LAN access from remote] from 5.231.68.67:49981 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:10
[LAN access from remote] from 5.231.68.67:49659 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:09
[LAN access from remote] from 5.231.68.67:49368 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:08
[LAN access from remote] from 5.231.68.67:49029 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:07
[LAN access from remote] from 5.231.68.67:48587 to 192.168.1.9:80 Tuesday, Jan 28,2014 19:15:06

failover

Last night/this morning I conducted a total brownout failover exercise.

What if everything in the world went down (or there was a major national grid outage, or similar, or Openreach forgot how to run a fibre network)?

What if someone dropped an aircraft on a regional power distribution centre?

What would happen to my extensive audio and video media library?

What would happen to my data?

Well, there’s only one way to find out (in a simulated kind of way, obv).

But first, before I did anything drastic, I plugged in my nice new shiny UPS unit.

And then I went to the MCB and flipped the switch.

And went to bed.

After six hours sleep I made tea and inspected the devastation and began reading the various server/device logs.

The router was dead, obv, but the NAS (in its capacity as DHCP router) was still up and showing full signs of alertness.

I could plug a monitor and keyboard directly in to HP Server A (I really need to name these things) and HP Server B and access the various media and data stores that are spread across these devices.

I could plug a laptop directly in to the NAS and access the operating system as an administrator. I could also access a partitioned area of the volume and and pick up any/all of the weekly contingency backup that was tucked away there.

And if I had integrated the router in to this setup, my WiFi and local area network would have been up and running for me to do all of these things from the comfort of my own bed.

But I deliberately left the router out of the protected environment, because it wouldn’t have been a real test, would it?

I took the quiet time as an opportunity to deploy a WordPress upgrade across the WP estate, and I triggered a non-standard backup on to my emergency external device.

Then I restored power.

The router came back up (logs showed no issues), and the local area network popped back in to place around the infrastructure.

And the UPS stood itself down and resumed charge mode.

So yeah, that was a pretty good test.

All server and system logs show no problems, and the router log merely records a hard shutdown.

Brilliant!

 

wordpress points of security

I may be preaching to the converted on this but…

I like WordPress (in fact I like most .php-based products).

I’ve tried Ghost and thought it was meh. I’ve worked with Drupal and thought it was alright (if slightly over-engineered).

But I *like* WordPress.

However, the more time I spend with it, the more I realise that WordPress has shortcomings, here and there.

It’s a pros and cons argument.

Yes, there is a very large user community developing features and facilities for the (functional and non-functional portions of the) application.

And this is good. This huge, hardcore team of developers are continually turning the WordPress product in to a much more sophisticated tool.

But there are also some naughty people out there, attempting to bugger up some people’s WordPress installations.

Just for a laugh.

When I was in LA three years ago, one of my WordPress-based websites was hacked.

It was a relatively straightforward task to get in to the back-end and fix the website. It was just frustrating that it had happened.

Though, interestingly, I believe I would fix the problem in a much simpler way these days.

But here are a couple of simple golden rules that everyone should undertake to protect their WordPress environment:

  • log in as administrator
  • create a new user (with a non-obvious name)
  • promote that user to administrator
  • log out as administrator
  • log in as the new administrator user you have just created
  • delete the old administrator account

And while I’m on the patronising subject of the blindingly obvious:

  • never publish content from an admin account – use an author/editor role
  • change your passwords  frequently (and use a random password generator for security)

But don’t worry about deleting your admin user if you have been posting from content from it – you can just assign your new author/contributor user as owner of the legacy content, and then you don’t lose anything.

Maybe you already know these things.

But we’re never to old to learn, are we?

not so odd probes

It’s a shame that I can’t set a ‘deny by IP address’ rule in my router, but sadly I can’t.

Last week I did manage (don’t ask) to create a port-based rule in my router.  The rule automatically rejects any request to access a specific list of ports.

So the only requests that the NAS (in its role as secondary firewall) has to process now are port 80 (and other common http-based) requests.

For the last week the CPU utilisation on the NAS has firmly remained steady in the 7-15% band.

resourceMon

 

 

 

 

 

So is that it?

Have I made hosting in to a trouble-free zone?

Interesting.

odd probes 2

What are Tech Mahindra playing at?

[LAN access from remote] from 199.68.218.129:47420 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:59
[LAN access from remote] from 199.68.218.129:34282 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:58
[LAN access from remote] from 199.68.218.129:39887 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:57
[LAN access from remote] from 199.68.218.129:39785 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:56
[LAN access from remote] from 199.68.218.129:50558 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:55
[LAN access from remote] from 199.68.218.129:51750 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:55
[LAN access from remote] from 199.68.218.129:49432 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:55
[LAN access from remote] from 199.68.218.129:13656 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:54
[LAN access from remote] from 199.68.218.129:13046 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:54
[LAN access from remote] from 199.68.218.129:32097 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:54
[LAN access from remote] from 199.68.218.129:12733 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:54
[LAN access from remote] from 199.68.218.129:54673 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:54
[LAN access from remote] from 199.68.218.129:43122 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:54
[LAN access from remote] from 199.68.218.129:37606 to 192.168.1.9:80 Saturday, Jan 11,2014 16:21:51

odd probes

The memory test results came back from Synology. The results were both conclusive and inconclusive.

They proved that the environment is stable and not under any strain. But they were unable to demonstrate why CPU utilisation was close to 100%.

There were no rogue (or non-rogue) services or processes spinning (and thus eating up CPU).

There were no jobs ticking along in either TSR or background.

And there were no previously unknown index-based utilities doing indexy-related things.

So it was a bit of a mystery as to why CPU should be almost maxed out (yet delivery performance was unaffected by the high-90%s utilisation – because, remember RAM utilisation was in the normal band).

I spent a couple of days wondering what could eat up CPU let leave RAM relatively untroubled.

I was travelling to work, a few days ago, when I remembered a conversation I had with my friend Avril, many years ago – about processing architecture and IP packets.

Avril was a network genius. She holds a number of networking patents, and has worked at BTs R&D division in Suffolk in a senior capacity. She also lectured, part time, at UWE on Real Time Information Systems.

We had a conversation, years ago, about processor architecture and how some types of processors are designed to dump processes in to RAM, whilst others will handle simple positive/negative steps themselves.

It’s as clear as crystal, if you remember the big RISC v Intel debate.

I looked up the architecture specs for the processors in the NAS and discovered that they are designed on the RISC SPARC model.

Light dawned.

So it was entirely possible that the processors were performing simple RAM-type processes, without actually dumping them in to RAM to be dealt with there.

On the way home I decided to check the router logs.

[later]

A look at the router logs confirmed what I’d thought: I was under a DDoS attack.

The router was stopping 95% of the probes, but the 5% that were getting through were enough to be eating up almost all of the CPU. The NAS was rejecting the 5%, but that yes/no process was where the CPU utilisation was going.

At the peak of the attack the router logs indicated that my infrastructure was receiving c. 500 probes per minute – so many probes that the router log couldn’t record them all, it was filling up and over-writing itself every few minutes.

Unfortunately, effective though the router’s firewall is, it isn’t configurable, so I have to rely on its defaults, and beef up the second layer of security on the NAS (which I’m using as secondary firewall and DHCP server/router).

So I figure that I just have to sit tight and wait out the DDoS attack.

But here’s a thing.

Do you know how much traffic your internet router is receiving?

I doubt many people bother to check.

But crack open the logs and have a look. I’m betting you’ll be surprised at what’s going on behind the scenes.

memory testing

This is exciting!

In an attempt to get to the source of the 100% CPU utilisation, I had a word with Synology support.

They got back to me with a suggestion of a memory diagnostic which I ran earlier this evening.

I’ve just mailed off two memory tests for analysis.

Watch this space for further updates!

(ps: ironically, the 100% CPU utilisation issue has not reared its ugly head since)

whittling away at it

I’ve updated the ‘pending’ list over there.

I have been less than impressed with Ghost (the platform, not Drift Ghost HD, my new video camera, which is excellent!). It has left me with a strong aftertaste of mediocrity. I understand the concept, but if you strip away the aspirations, really it has no significant advantages over Drupal or WordPress (and has some fairly hefty disadvantages).

Subdomains (both leading and trailing) were actually much easier to get a grip of than I thought they would be. The simpler method, where there is a need, is to deploy trailing subdomains, but I do understand why the geeky amongst us would prefer leading subdomains.

I had initially set up one of the HP servers, but both are now up and running. I have some test MySQL databases on one, a couple of test domains on the other and I’m experimenting with the split of data (between ‘A’ and ‘B’ boxes).

There is, though, a periodic routing problem that I want to get to grips with. The internet router seems to be doing its job, the NAS (acting as DHCP router) seems to be doing its job, and the servers seem to be doing their jobs.

But every now and then latency creeps up and can run up from an operating level of +90ms to as much as +3s.

I need to sit down and figure out where this is springing from and why it’s a periodic issue. No packets are being lost, so it’s not as if the routing is being dropped, just slowed down. I have also noticed that sometimes the CPU on the NAS rises to 99% utilisation from the customary 15-25%. But when it does peak that high, the RAM utilisation scarcely gets over 35%.

Anyway, I’m sure the routing thing is fixable and probably needs nothing more than some fine-tuning. I’d like to sit down and check my IP addressing. But as ever, this all needs time and there isn’t too much spare time knocking about, at the moment.

Not on the ‘pending’ list, but I have spent a lot of time (almost all of this weekend) consolidating data from a multitude of backups.

Over the last six years I’ve burned out three laptops (or hard disks in laptops).

Before I bought the NAS I undertook a weekly global backup of my laptop(s), all the way back to 2008. To accommodate these backups, I bought three external HDDs (one 500Mb, the other two 1Tb each).

So this weekend, while the weather has been absolutely pants, I’ve been consolidating the data from these individual devices on to the ‘A’ HP server.

This consolidation hasn’t really increased the data footprint on the ‘A’ server very much, but it has freed up three fairly large external HDDs. I have no idea what I’m going to do with them, but I’m sure I’ll think of something.

(a nice side effect of the data consolidation is that my iTunes library has now risen to 7,500 songs)

puzzling it

Earlier this evening I had a look at the router log.

It’s showing *a lot* of IP-related activity.

I don’t know enough about IP traffic-types to be able to read the log and determine what it all means.

But if you do, could you drop me a line?

Here’s an excerpt. If you look at the timings, you’ll see what I mean by *a lot*!

[LAN access from remote] from 165.88.254.215:36379 to 192.168.1.9:80 Friday, Jan 03,2014 21:06:50
[LAN access from remote] from 122.55.79.221:39718 to 192.168.1.9:80 Friday, Jan 03,2014 21:06:41
[LAN access from remote] from 173.192.238.41:50686 to 192.168.1.9:80 Friday, Jan 03,2014 21:06:14
[LAN access from remote] from 173.192.238.41:50549 to 192.168.1.9:80 Friday, Jan 03,2014 21:06:14