The winter has arrived early in Norway this year. Cold winds from Sibir have brought freezing temperatures all over the country. Its now approx -10C here in Oslo, and the temperatures are expected drop further next week. This is good news for my balcony server!
I use Munin to monitor the temperature sensors in the server. One of the CPU cores is showing a nice 6C. One of the disks records 5C. Hopefully the fans will start spinning again once the temperatures starts rising again in the spring...
Since I'm a little worried what will happen if the temperatures drops below 0C inside the disks, I started the folding client to generate some heat (it uses 100% CPU on all cores). The temperature immediately jumped ~5-10 degrees:
Now I'm ready for the winter!
27 Nov 2010
8 Nov 2010
Great Firewall of China
I'm attending the IETF79 meeting here in Beijing. So far, it has been great. Meeting the people I've only read about, and participating in discussions. In particular, I'm looking forward to the kitten WG meeting (GSS-API authentication) and anything related to SIP, in particular sipcore.
Since this is Beijing, we're behind the Great Firewall of China, also called The Golden Shield. It works, as far as I've read, on three layers:
A couple of DNS lookups of blocked sites from behind the firewall:
$ cat /etc/resolv.conf
nameserver 202.106.0.20
nameserver 202.106.46.151
$ dig +short www.facebook.com
$ dig +short www.youtube.com
youtube-ui.l.google.com.
youtube-ui-china.l.google.com.
66.249.89.100
66.249.89.101
$ dig +short www.blogspot.com
blogger.l.google.com.
72.14.203.191
But IETF's NOC have taken over the hotel network (both wired and wireless) and are currently bypassing the firewall. In cooperation with Tsinghua University, two 1Gbps links connect us to the CERNET (with backup to CSTNet).
A couple of test network has also been deployed. Including a IPv6-only network and a IPv6 network using NAT64.
Since this is Beijing, we're behind the Great Firewall of China, also called The Golden Shield. It works, as far as I've read, on three layers:
- A rudimentary "DNS block" and/or redirect.
- If you access the IP-address directly, it sends a TCP RST effectively tearing down your connection. (You browser responds with a "Connection reset")
- Content filtering of HTTP-traffic. Especially targeted at news-articles containing certain sensitive information. If a one or more pre-defined keywords appear in the page, the connection is blocked.
A couple of DNS lookups of blocked sites from behind the firewall:
$ cat /etc/resolv.conf
nameserver 202.106.0.20
nameserver 202.106.46.151
$ dig +short www.facebook.com
$ dig +short www.youtube.com
youtube-ui.l.google.com.
youtube-ui-china.l.google.com.
66.249.89.100
66.249.89.101
$ dig +short www.blogspot.com
blogger.l.google.com.
72.14.203.191
But IETF's NOC have taken over the hotel network (both wired and wireless) and are currently bypassing the firewall. In cooperation with Tsinghua University, two 1Gbps links connect us to the CERNET (with backup to CSTNet).
A couple of test network has also been deployed. Including a IPv6-only network and a IPv6 network using NAT64.
Subscribe to:
Posts (Atom)