... Roskomnadzor does not comment on rumors ...
Roscomnadzor added 329 IPs of WhatsApp, 180 IPs of Akamai and some IPs of Russian hosters to the blocklist at 17 May 2018, 14:14 MSK. The "mistake" was corrected at 17 May 2018, 15:19 MSK.
The situation was similar to that which occurred on the night of April 27th. I'd also like to highlight that making the blocking system dependent on untrusted external data source is probably the favorite Roscomnadzor trouble.
Roscomnadzor denies everything:
- TASS RU
Caedite eos. Novit enim Dominus qui sunt eius
28 Apr 2018, 13:27 MSK, 3 subnets are removed from the dump: 2.192.0.0/11 (Amazon), 54.160.0.0/12 (Amazon), 91.121.0.0/16 (OVH). They contain slightly over 3 million addresses.
As part of the enforcement of the court decision on Telegram, the Russian Federal Service for Supervision of Communications (Roscomnadzor) unblocks three subnets belonging to foreign hosting providers, in order to avoid access issues related to law-abiding resources. The Telegram IP addresses withing these subnets, however, have been deteсted and remain blocked
So I took a look how many addresses have been detected and remained unblocked - and it's 18 of 3 millions. They kept 3 million IPs blocked to restrict just 18 of them. Here they are: 52.213.9.239, 54.165.90.185, 54.174.213.153, 52.204.174.82, 52.207.227.151, 52.221.241.122, 91.121.67.146, 91.121.117.21, 52.213.9.239, 52.192.131.204, 52.199.159.6, 52.221.190.123, 52.221.241.122, 52.201.243.124, 52.204.174.82, 54.165.90.185, 54.169.62.158, 54.174.213.153. Currently, a total of over 14 million IPs remain blocked.
08 May 2018, 14:36 MSK 6 subnets are removed from the dump: 35.208.0.0/12 (Google Cloud), 35.224.0.0/12 (Google Cloud), 35.184.0.0/13 (Google Cloud), 139.59.0.0/16 (Digital Ocean), 23.251.128.0/19 (Google Cloud). They contain slightly over 3.7 million addresses.
As part of the enforcement of the court decision on Telegram, the Russian Federal Service for Supervision of Communications (Roscomnadzor) unblocks six subnets belonging to Google (more than 3.7 million addresses). The Telegram IP addresses withing these subnets, however, have been deteсted and remain blocked.
So I took a look how many addresses have been detected and remained unblocked. It's 354 of 3.7 millions - there are 14 addresses from DigitalOcean subnet and 340 from Google. They kept 3.7 million IPs blocked to restrict just 354 of them. Currently, a total of over 10 million IPs remain blocked.
Nota bene, the latest introduction of Google IP subnets to the blocklist happened on the 27th of April. Latest DigitalOcean subnets were introduced on the 2nd of May. So, Roskomnadzor got no new data, there was no visible work done to make detection itself more precise than before. It's obvious to me, those large subnets were blocked as "hostages".
... not sent to ISPs for filtering
Roscomnadzor added some IPs of Yandex, VKontakte and MSK-IX to the blocklist at midnight of the 27th of April. The "mistake" was corrected at 02:00.
The short-lived presence of some of social network IP addresses in the registry is caused by implementation details. Those IP addresses were not sent to ISPs for filtering.
I want to disappoint Roscomnadzor — there is no telepathy. We know those IP addresses from the dump that was sent to ISPs for filtering. Implementation detail of the system is that the system works in an automatic mode and is based on external datasource. So, malicious actor can "poison" the system in some cases, pushing fake data via the datasource he can control. I've pointed that out in early April of 2018 RU. I'd also like to highlight that making the blocking system dependent on untrusted external data source is probably the favorite Roscomnadzor trouble.
Roscomnadzor partly blocks some of Google websites
I try to reverse-engineer Google's load balancing based on client subnets to get IP addresses used for frontends serving Russian traffic for pre-defined list of Google websites. I compare those scraped IP addresses with IP addresses in the blacklist dump and add the matches to the list of websites.
There are at least ... IP addresses in the dump out of ... IP serving following websites: ... (get IPs)
Roscomnadzor denies everything
- at official Facebook page RU
- at official VK pagе RU
- at its own official website — once... RU
- at its own official website — twice... RU
- at its own official website — thrice... RU
«Telegram went down by 77%»
The amount of Telegram impressions went down by 76,5% as of the 23th of April compared to the 16th according to «Medialogiya» company. The 16th was the day when blocking actually started.
The published statistics is incorrectly collected (in the best case) or is consciously manipulated to get nice numbers (in the worst one). There is no reason to discuss Medialogiya publishing alike data or Roscomnadzor citing the data in a few hours after the publication. Let's just look at the numbers, let's be objective.
You can also read quite conservative analysis written by Meduza RU.
I'd like to add that Combot is, probably, absolute leader in Telegram groups & channel statistics collection at least within Russian market segment. I'd prefer to avoid commenting that Roscomnadzor's statement.
«... it's the responsibility that's not OK»
This information does not match with the reality. It's just like «someone called me and told me — so that's the truth». I can say for sure that 99.9% of the cases show no, saying technically, FUBAR incidents with anything besides Telegram itself.
My colleague Leonid Evdokimov counted amount of domains within .RU, .РФ and .SU domain zones
pointing to blocked networks using "A"
DNS resource record.
Thanks to Alexey from awesome beget for available domain statistics!
We understand that there are TLD besides those three, there are abandoned domains, parked domains and mirrors. But we still consider that it's correct to estimate the shape and volume of the Runet tragedy using those zones. Here are underestimated numbers of affected domains according to the blacklist dump dated 2018-04-20 11:13:00 +0000:
- RU: 31440
- РФ: 1856
- SU: 560
- Total: 33856
2018.04.24 ROCIT informs that it got 2250 complains regarding carpet IP-blocking within 15 hours of hotline operation RU.
Up-to-date list of domain names, pointing to blocked subnets.