<div dir="ltr">> Making arguments based upon extreme cases, assumptions, or potential-for-collateral-damage is not scientific. "I know one that even [...]" Anecdotal evidence isn't scientific.<div><br></div><div>From the perspective of your previous sentences that's kinda humorous. "To avoid unnecessary costs incurred from disruption of service, excessive traffic, annoyances using up *my* time, and countless other reasonable rationale from *my* point of view." Because sure, a few (hypothetical RIPE probe) connections are exactly that, zero exaggeration, right?</div><div><br></div><div>In the end such fail2ban-fueled (or similar) behaviour I initially addressed, is exactly a non-scientific extreme-case assumption-based approach. There are better and even more standard ways. </div><div><br></div><div>Crutch solutions out in the wild shouldn't be a showstopper for measuring the ecosystem. (That is already quite neglected)</div><div><br></div><div>> What _objective_ risk/benefit analysis are you basing your opinions upon?<br><br>And you? What's the implication here about systems being as trigger-happy as previously described?</div><div><br></div><div>Because sure, at some point rate limits make total sense, but certainly not at the point where it would ban any potential RIPE probes.</div><div><br></div><div>> Are you a systems administrator?</div><div><br></div><div>Let's not get into such measuring contests, even if it is the RIPE Atlas mailing list.</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Tue, Sep 20, 2022 at 11:42 PM Paul Theodoropoulos via ripe-atlas <<a href="mailto:ripe-atlas@ripe.net">ripe-atlas@ripe.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<div>
On 9/20/2022 10:45 AM, Avamander wrote:<br>
<blockquote type="cite">
<div dir="ltr">Great to hear it works for you, but the potential
unfortunate collateral from such a blanket action is not really
RIPE Atlas' problem. There are more fine-grained methods against
bruteforce attempts and open relay probes, than triggering on a
few connections.</div>
</blockquote>
What _objective_ risk/benefit analysis are you basing your opinions
upon? Are you a systems administrator? My responsibility is to avoid
unnecessary costs incurred from disruption of service, excessive
traffic, annoyances using up *my* time, and countless other
reasonable rationale from *my* point of view. <br>
<br>
You suggest that it is "not really RIPE Atlas' problem". That's very
true. And it is not really my problem if I bounce yoinky, pointless
probes of my server, and ruthlessly block them from contacting my
server ever again. My server, my choice, my wallet, nobody's
business but my own.<br>
<blockquote type="cite">
<div dir="ltr">
<div>Some webmasters ban IP's for simply visiting a domain, I
know one that even dispatches an email to your ISP's abuse@
address upon visit. Should RIPE Atlas probes then not probe
any HTTP servers? The answer is obviously no, they shouldn't
care.</div>
</div>
</blockquote>
Making arguments based upon extreme cases, assumptions, or
potential-for-collateral-damage is not scientific. "I know one that
even [...]" Anecdotal evidence isn't scientific.<br>
<br>
Note, I run a probe myself. I don't block any RIPE Atlas traffic on
my separate servers hosted on AWS, Oracle, and GCE. <br>
<br>
<div>-- <br>
Paul Theodoropoulos<br>
<a href="https://www.anastrophe.com" target="_blank">anastrophe.com</a></div>
</div>
-- <br>
ripe-atlas mailing list<br>
<a href="mailto:ripe-atlas@ripe.net" target="_blank">ripe-atlas@ripe.net</a><br>
<a href="https://mailman.ripe.net/" rel="noreferrer" target="_blank">https://mailman.ripe.net/</a><br>
</blockquote></div>