←back to thread

597 points classichasclass | 6 comments | | HN request time: 0.005s | source | bottom
Show context
Etheryte ◴[] No.45010574[source]
One starts to wonder, at what point might it be actually feasible to do it the other way around, by whitelisting IP ranges. I could see this happening as a community effort, similar to adblocker list curation etc.
replies(9): >>45010597 #>>45010603 #>>45010604 #>>45010611 #>>45010624 #>>45010757 #>>45010872 #>>45010910 #>>45010935 #
1. delusional ◴[] No.45010624[source]
At that point it almost sounds like we're doing "peering" agreements at the IP level.

Would it make sense to have a class of ISPs that didn't peer with these "bad" network participants?

replies(2): >>45010659 #>>45010714 #
2. JimDabell ◴[] No.45010659[source]
If this didn’t happen for spam, it’s not going to happen for crawlers.
3. shortrounddev2 ◴[] No.45010714[source]
Why not just ban all IP blocks assigned to cloud providers? Won't halt botnets but the IP range owned by AWS, GCP, etc is well known
replies(3): >>45011111 #>>45011141 #>>45011475 #
4. hnlmorg ◴[] No.45011111[source]
Because crawlers would then just use a different IP which isn’t owned by cloud vendors.
5. jjayj ◴[] No.45011141[source]
But my work's VPN is in AWS, and HN and Reddit are sometimes helpful...

Not sure what my point is here tbh. The internet sucks and I don't have a solution

6. aorth ◴[] No.45011475[source]
Tricky to get a list of all cloud providers, all their networks, and then there are cases like CATO Networks Ltd and ZScaler, which are apparently enterprise security products that route clients traffic through their clouds "for security".