I finally got the cooktop and oven removed from their nooks in the cabinets and countertop and got a good look behind there. There is, in fact, a gas line back there, in the middle of a hole the builders helpfully hammered out of the drywall. So now I’m waiting for a call back from a plumber to schedule him to come out and install a cutoff valve on that line. After that I’m going to have to remove a couple boards that were used to make the shelf for the oven, cut the countertop (it’s getting replaced anyways), and go out and buy a gas range. I’m probably going to have the carpenter give me an estimate on installing a new countertop while he’s out here giving me estimates on some other work.
So China got caught (again) doing what every country on the planet with more than a 56K dialup connection to the Internet does and now there’s a big stink about espionage and all the hacking attempts coming from there.
There’s an easy solution to this issue. Snag my script and start blocking China (or any other country) in and out of any in/out point of any of your networks that might have things you don’t want shared with Beijing.
What’s that? You do business or need to be contacted by folks over there? Great! Snag my script, protect your real networks, and put a completely isolated web site, mail server, whatever else you need out there in a datacenter that has no connections to your main networks so that even if it gets compromised, who cares.
If you’re not a small fry, you can still use the data provided by the nice folks over at IPDeny to build a rule set for your hardware firewall or other device.
Really people, this isn’t that hard.
I’ve been hacking around with this for a while now and have it in a workable state. It’s a script that grabs the latest netblocks for the configured countries from IPDeny.com and loads them in to IPTables rules. It’s perl and depends on you having the IPTables::IPv4 module installed, but it’s fast and just blocking China and Korea has cut way down on my spam and intrusion attempts.