Australian (ASX) Stock Market Forum

Sorry about that downtime

Keep getting a redirection notice then 15 second pause where it opens or fails 50/50 bet!

Sorry about that, but unfortunately we're still in attack mode. The server has been hit by almost 100 million separate attacks today. I have been working with the host most of the day to mitigate these attacks, and we're slowly getting on top of it.

Until we're out of attack mode you will get the redirection notice about once every half an hour.
 
Good morning everyone. The server went down again around 6am, but it's up again now. I'm still waiting on the host to provide an explanation as to what happened.

Let's see how we go today.
 
@Joe Blow , just throwing 2 ideas, you may already be on it,
1 ASF is hugely accessed legitimately from oz, so you could filter out non Australian requests from ip.i somewhat suspect that the machines "enslaved" for the dos attack will be non oz in majority (Basic stats)
2 based on this location idea, maybe check the speed of reply in the request...
If OS, will be slower..obviously then bad luck for legit ASF users on dialup

Just 2 ideas if it helps, none will be perfect answer even if they work
Hold strong
 
@Joe Blow , just throwing 2 ideas, you may already be on it,
1 ASF is hugely accessed legitimately from oz, so you could filter out non Australian requests from ip.i somewhat suspect that the machines "enslaved" for the dos attack will be non oz in majority (Basic stats)
2 based on this location idea, maybe check the speed of reply in the request...
If OS, will be slower..obviously then bad luck for legit ASF users on dialup

Just 2 ideas if it helps, none will be perfect answer even if they work
Hold strong

Another idea is to blacklist whole suspect subnets/isps where the attacks mostly originate or even countries. I have seen this technique used in the past and few times been caught out too being on a suspected subnet through not fault or my own. But as frog says if its 1% that might possibly lose access from non au locations it is probably worth it, temporarily. Good of the many outweight...
 
Another idea is to blacklist whole suspect subnets/isps where the attacks mostly originate or even countries. I have seen this technique used in the past and few times been caught out too being on a suspected subnet through not fault or my own. But as frog says if its 1% that might possibly lose access from non au locations it is probably worth it, temporarily. Good of the many outweight...
Yes, we all agree not perfect or foolproof.
I like(d) reading ASF from Asia, and some dos will originate from oz but lesser evil..
 
Some of you may have received an "Origin Error" when trying to access ASF this morning. The host has told me that this was due to a routing error in the data centre where ASF is hosted.

It is being dealt with by the host and should now hopefully be resolved.

Apologies for any inconvenience caused.
 
Last edited:
Top