Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Not a good start...
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Not a good start...

raindog308raindog308 Administrator, Veteran

"Hey I have some time here on my lunch hour to kill...maybe I'll pop over to the guest wireless and setup that crappy $5/yr VPS I bought from @HOSTBD24 and...oh..."

image

Looks like someone is not keeping either his network or his reputation clean.

Comments

  • netomxnetomx Moderator, Veteran

    $5? wherE?

    Thanked by 1dedicados
  • NeoonNeoon Community Contributor, Veteran
    edited January 2016

    @netomx said:
    $5? wherE?

    For 5$ mostly crap.

    Thanked by 1netomx
  • eastoncheastonch Member
    edited January 2016

    It's also a corporate web proxy - Most companies block / restrict access to these sorts of services. Data ex-filtration is usually the concern.

    Has the provider been informed?

    Edit: Noticed it was the "guest wifi" even still, may be under similar scrutiny as the staff network. It would be interesting to see what the IT Department have as the source of that ban...

  • raindog308raindog308 Administrator, Veteran

    eastonch said: It's also a corporate web proxy - Most companies block / restrict access to these sorts of services. Data ex-filtration is usually the concern.

    I can access Berry.pw, BuyVM, CatalystHost, HostMyBytes, Hostigation, KnownHost, Linode, Ramnode, SecureDragon, TragicServers, WiredTree (both billing & CP) just fine. It's only this one.

    I'm in the IT department :-) It's one of the big web filtering services but I forget which one.

    Thanked by 1netomx
  • eastoncheastonch Member
    edited January 2016

    raindog308 said: I'm in the IT department

    Well that makes sense I guess :), could you perhaps find a reason why it was banned, there could be some meta info on the block on the filter somewhere ^^. From what I can establish it's a OVH box, so potentially it's had history there, though I cant find it on any blocklists.

    It sounds strange, but have you had issues with other LetsEncrypt SSL sites? Can you access http://cert.int-x1.letsencrypt.org/ for instance? or http://cps.root-x1.letsencrypt.org?

  • @raindog308

    I am really sorry you have to face this problem,

    But i have tried look up that this IP is blacklisted or not, which seems not be blacklisted:
    http://www.ipvoid.com/scan/158.69.210.10/
    https://www.spamhaus.org/query/ip/158.69.210.10

    and the control panel you are trying to access is hosted on different network where only the control panel is hosted. So i see no way it can happen for abusing on the network.

    But i think it can be for your corporate web proxy or LetsEncrypt SSL as SolusVM use LetsEncrypt by default from last update i had.

    Please create a support ticket with more details, so we can investigate it more and solve it.

  • netomxnetomx Moderator, Veteran

    Please update your sig, you don't have the new year sale again

  • gestiondbigestiondbi Member, Patron Provider
    edited January 2016

    Let's Encrypt is broken on many device and software. Ex: WebSense, BlackBerry, etc.

    Hope to get the root updated soon :S

    In my opinion, it's should not be used in production yet...

  • raindog308raindog308 Administrator, Veteran

    eastonch said: It sounds strange, but have you had issues with other LetsEncrypt SSL sites? Can you access http://cert.int-x1.letsencrypt.org/ for instance? or http://cps.root-x1.letsencrypt.org?

    Those two worked fine.

  • emgemg Veteran

    In case anyone wants to try a similar service, you can test any URL against TrustedSource's database here:

    https://www.trustedsource.org/en/feedback/url?action=checksingle

    My firewall queries McAfee SmartFilter XL, the second item in the pulldown menu.

    "ssl://" did not work for me, so I assume that the URL that @raindog308 used was https://vps.hostbd24.com, right? (port 443 assumed)

    The URL above passed for my firewall. Every once in a while, there is an otherwise innocuous website that fails. I see warnings like "High Risk, Malware", etc. I assume that those website servers were hacked.

    My guess is that @raindog308's company has a firewall that relies on a different service, but roughly equivalent.

Sign In or Register to comment.