原始链接: https://news.ycombinator.com/item?id=41327394
使用“tracert”(大多数版本的 Windows 和 Unix 操作系统中包含的命令行工具),用户可以可视化通过计算机网络发送的数据包到达特定目的地所采取的路线。 其工作原理如下:当您输入“tracert”并后跟域名或 IP 地址时,您的设备会发出一系列称为“请求”的消息。 这些请求通过多个路由器、交换机和其他网络硬件,直到到达目标服务器。 每个中间设备通过发回有关自身的信息来响应请求,包括响应时间、时间戳和链中下一跳的 ID。 通过分析这些响应,用户可以获得有关路由基础设施和网络内潜在瓶颈的宝贵见解。 除了诊断与延迟或连接问题相关的问题之外,跟踪路由数据还可以帮助识别服务器、运营商甚至数据中心的物理地理位置。 这些知识使用户能够对其数字足迹做出明智的决策,优化性能或确保遵守要求数据驻留的法规。 此外,了解底层网络架构可以实现安全分析的先进技术,例如检测表明恶意行为的异常活动模式或识别系统中易受攻击的节点。 在更大范围内,研究人员探索了将跟踪路由数据与其他公开可用数据集集成的方法,以揭示看似不同的基础设施之间的联系——从核反应堆和海底电缆端点到主要云服务和人工智能装置。 例如,将现役和退役核电站的地图与数据中心和海底电缆地图相结合,揭示了支持现代社会技术进步的能源、部件制造和通信路线的复杂网络。 此外,研究与关键基础设施组件相关的运输记录和海关申报可以帮助查明人工智能集群的位置和扩展趋势及其电力需求。 最终,traceroute 提供了一个强大且易于访问的窗口,可以了解我们日益相互依赖的世界的复杂细节,既提供了解决网络问题的实用工具,也提供了宝贵的研究和调查机会。 然而,应该指出的是,虽然跟踪路由数据提供了重要的见解,但由于与国家安全和知识产权相关的潜在风险,在共享敏感信息时必须仔细考虑。
There are a lot of good talks on Tracert.
This one is pretty good:
https://www.youtube.com/watch?v=jGYAW5z6BJc
The article OP links to is only talking from the perspective of an internal network. Tracrt in a 10. network is boring info.
In the vid I posted, he gives you really good common advice about using tracert to show you actually the physical layout of the path:
https://i.imgur.com/LxN9Mr4.png <-- Using the DNS name of the router is great, because us network nerds like to use naming conventions in a graph format: so you can tell that its edge router number N at location B in City X and using tracert - you get to see the national networks the packet hits.
THen by seeing the carrier, you can also see where there is not just a change in carrier, but also that indicates that at that location is a datacenter....
You can go onto DatacenterMaps and find out who/what/where a DC is....
(There is a really exceptional tech talk on tracert thats quite long that goes into bitlevel detail of weaponized tracrt - but I cant find it)....
---
WRT DataCenterMaps -- There was an HNer that posted about mapping nuclear facilities (active and decommissioned) - and by using his map, the UnderSeaCableMap and the DataCenterMap - then by looking at shipping supply-chains for components used_by/made_by/received_at companies that are either Data Centers, or NVIDIA - we could track where large scale AI componentry is being installed into what data centers, which are fed by which Nuclear Power Plants, who have to report on their Consumption Graph - and which Cable Infra is likely feeding each DC.
We can see where AI traffic flows - and by using tracert at a deeper level - we can see exactly the AI's Physical NeuroNet' - and find a way to measure its power consumption and physical footprint.
---
HNer @externedguy "..built interactive map of active & decommissioned nuclear stations/reactors"
https://news.ycombinator.com/item?id=41189056
(I correlated the Nuclear reactor locations with DataCenters, undersea cable endpoints (which will be near both nukes and datacenters)
As they could be layers - and we track shipments and we can see where AI consumes:
---
...if we add the layers of the SubmarinCableMap [0] DataCenterMap [1] - and we begin to track shipments
And
https://i.imgur.com/zO0yz6J.png -- Left is nuke, top = cables, bottom = datacenters. I went to ImportYeti to look into the NVIDIA shipments: https://i.imgur.com/k9018EC.png
And you look at the suppliers that are coming from Taiwan, such as the water-coolers and power cables to sus out where they may be shipping to, https://i.imgur.com/B5iWFQ1.png -- but instead, it would be better to find shipping lables for datacenters that are receiving containers from Taiwan, and the same suppliers as NVIDIA for things such as power cables. While the free data is out of date on ImportYeti - it gives a good supply line idea for NVIDIA... with the goal to find out which datacenters that are getting such shipments, you can begin to measure the footprint of AI as it grows, and which nuke plants they are likely powered from.
Then, looking into whatever reporting one may access for the consumption/util of the nuke's capacity in various regions, we can estimate the power footprint of growing Global Compute.
DataCenterNews and all sorts of datasets are available - and now the ability to create this crawler/tracker is likely full implementable
https://i.imgur.com/gsM75dz.png https://i.imgur.com/a7nGGKh.png
[0] https://www.submarinecablemap.com/
[1] https://www.datacentermap.com/
----
And 8 months back I posted:
In the increasingly interconnected global economy, the reliance on Cloud Services raises questions about the national security implications of data centers. As these critical economic infrastructure sites, often strategically located underground, underwater, or in remote-cold locales, play a pivotal role, considerations arise regarding the role of military forces in safeguarding their security. While physical security measures and location obscurity provide some protection, the integration of AI into various aspects of daily life and the pervasive influence of cloud-based technologies on devices, as evident in CES GPT-enabled products, further accentuates the importance of these infrastructure sites. Notably, instances such as the seizure of a college thesis mapping communication lines in the U.S. underscore the sensitivity of disclosing key communications infrastructure.
Companies like AWS, running data centers for the Department of Defense (DoD) and Intelligence Community (IC), demonstrate close collaboration between private entities and defense agencies. The question remains: are major cloud service providers actively involved in a national security strategy to protect the private internet infrastructure that underpins the global economy, or does the responsibility solely rest with individual companies?
(There was talk on this topic recently in the news)
EDIT:
If you like this sort of networking - then courses/material like this are great:
https://www.youtube.com/watch?v=Ih3KgQnT6T0 <-- network recon, scanning, countermeasures - failryl vanilla, but concise.
---
I still cant find the defcon-style talk that really dives into tracert sorcery....