Pages: 1 :: [one page] |
|
Author |
Thread Statistics | Show CCP posts - 0 post(s) |
Donedy
Snuff Box
193
|
Posted - 2014.02.28 20:31:00 -
[1] - Quote
Cant login with most of my accounts... |
SLOW10000
KINGS OF EDEN Sev3rance
1
|
Posted - 2014.02.28 20:32:00 -
[2] - Quote
servers ar funky today |
flakeys
The Mjolnir Bloc The Bloc
2078
|
Posted - 2014.02.28 20:32:00 -
[3] - Quote
After a week of this **** it is getting annoying to say the least.I don't know what's going on but eve servers lately remind me of eve 2005 ....
Fix it boys
We are all born ignorant, but one must work hard to remain stupid.
|
Shylah
Arkendor Explorations
0
|
Posted - 2014.02.28 20:32:00 -
[4] - Quote
Same here |
Scipio Asanari
The Mjolnir Bloc The Bloc
8
|
Posted - 2014.02.28 20:32:00 -
[5] - Quote
apparently there's some big fight in null somewhere, causing all kinds of problems |
Serene Repose
Saanen Freight Service
960
|
Posted - 2014.02.28 20:34:00 -
[6] - Quote
I love countermeasures. It's almost as though CCP located the offending DNS and released a power surge to blow up the offending motherboard. Pictures at eleven. I have sworn upon the altar of God eternal hostility toward every form of tyranny over the mind of man.-á |
Forever StuckInHere
Kellerman Bros
0
|
Posted - 2014.02.28 20:34:00 -
[7] - Quote
Kicked out here too. I wonder if it's a resumption of todays earlier DDoS attack. Happened before DT I think |
Xylem Viliana
Protomonolithic
152
|
Posted - 2014.02.28 20:37:00 -
[8] - Quote
I have it on good authority that an in game friend was feeling horny and decided to butthump the server monkey |
Ptraci
The Irukandji Ineluctable.
1788
|
Posted - 2014.02.28 20:52:00 -
[9] - Quote
People are playing with a new DDoS tactic, abusing the Network Time Protocol to amplify DDoS attacks. Bandwidths of well over 400Gb/s are being directed at popular websites and hosts. Expect crappy internet for a few days until this threat is neutralized. |
Noxisia Arkana
Deadspace Knights
215
|
Posted - 2014.02.28 21:20:00 -
[10] - Quote
Ptraci wrote:People are playing with a new DDoS tactic, abusing the Network Time Protocol to amplify DDoS attacks. Bandwidths of well over 400Gb/s are being directed at popular websites and hosts. Expect crappy internet for a few days until this threat is neutralized.
You always have such obscure knowledge. +1 Brava. |
|
Kimmi Chan
Tastes Like Purple
1657
|
Posted - 2014.02.28 21:23:00 -
[11] - Quote
Damnit!!
If only we could get the Devs and GMs to weigh in on this. "Grr Kimmi-á Nerf Chans!" ~Jenn aSide
www.eve-radio.com -áJoin Eve Radio channel in game! |
Unsuccessful At Everything
The Troll Bridge
10533
|
Posted - 2014.02.28 21:39:00 -
[12] - Quote
How many threads on this subject? Im not even going to count..ill just say.....12? 12 sounds like a good round number.
12 threads on this, including 1 official thread with CCP Eterne and GM Spiral in on it (although it could use a little Falcon bad pun humor to spice it up).... anyways, blah blah 1 more thread..blah blah really necessary....blah blah search > new topic blah blah im phoning this in yawn snore.
Since the cessation of their usefulness is imminent, may I appropriate your belongings? |
KnowUsByTheDead
Old Seers Of Arbitrary Stimulation
1003
|
Posted - 2014.02.28 23:01:00 -
[13] - Quote
Well, EvE is dead...
Because I killed it.
I would go into details...
But it involved biological weapons, duct tape, a bone saw, and a tin cup.
Because science.
Once you realize what a joke everything is, being the comedian is the only thing that makes sense. -á-á-á-á-á-á-á |
Rich Uncle PennyBags
EVE Online Monopoly
146
|
Posted - 2014.02.28 23:03:00 -
[14] - Quote
DDoS according to CCP's twitter. They're working on it. |
Nicolai Serkanner
Brave Newbies Inc. Brave Collective
73
|
Posted - 2014.03.01 01:25:00 -
[15] - Quote
Suck it up boys. No problems here. End user problem? |
Erotica 1
Krypteia Operations CODE.
3960
|
Posted - 2014.03.01 01:54:00 -
[16] - Quote
And here I was thinking we were going to read about some botter or worse...
I suggest CCP speak with liquid web, which also does business as storm, because they have experience with ddos protection.
http://www.liquidweb.com/services/ddos.html
I know at least one guy who switched after his prior (very well respected host) could do nothing for him to mitigate a ddos.
It's sad that someone would attack EVE's servers (a ragequit carebear it guy??) but perhaps some outside counsel with extensive experience with these attacks wouldnt hurt. I realize CCP already has awesome guys running things, but more help couldn't hurt.
See Bio for isk doubling rules. If you didn't read bio, chances are you funded those who did. |
Muestereate
Minions LLC
178
|
Posted - 2014.03.01 02:24:00 -
[17] - Quote
Ptraci wrote:People are playing with a new DDoS tactic, abusing the Network Time Protocol to amplify DDoS attacks. Bandwidths of well over 400Gb/s are being directed at popular websites and hosts. Expect crappy internet for a few days until this threat is neutralized.
Thanks Ptraci, hadn't poked around cause this hasn't affected me yet
Quote:The attack is based on a very simple premise:
NTP servers that respond to MONLIST Mode 7 command requests will generate responses that are 5,500 times bigger in size than the requests. Paired with the ability to spoof network addresses globally, this attack allows the attacker to send a huge number of those requests toward a number of known public NTP servers and solicit a huge response toward the spoofed address of the (source) victim.
There are three key points regarding this vulnerability:
The server that is "open" for NTP Mode 7 requests can receive a huge number of requests and be forced to generate responses that are up to 5,500 times larger than original requests. The vulnerable NTP servers are used as UDP reflectors in attacks against targeted destinations that may or may not have NTP servers or NTP clients on their networks. Regardless, these targets receive a flood of unsolicited return UDP traffic directed toward them at the destination port of the attacker's choice. The network that is being used as a source (victim) in a spoofed barrage of NTP requests to such servers will find itself under a huge flow of unsolicited NTP responses.
Keep in mind that, although the characteristics of this attack use NTP packets, this series of attacks is in no way different from typical reflected DDoS amplification attacks. Networks are being sent a flood of unsolicited packets that can grow significantly in both size and speed.
still struggling to understand what this means
So much to look up, guess I'll start with mode 7 cisco, thanks again.
|
Ave Kathrina
My Ass Is On Fire
159
|
Posted - 2014.03.01 08:16:00 -
[18] - Quote
Not dead. Dying.
Eve is dying... ask anyone. I've done some really stupid **** in this game. |
Miriya Zakalwe
Rifterlings Point Blank Alliance
90
|
Posted - 2014.03.01 08:23:00 -
[19] - Quote
This is just some users taking advantage of my business, Eve's first legitimate IP datagram doubling scheme. |
Muestereate
Minions LLC
178
|
Posted - 2014.03.01 10:25:00 -
[20] - Quote
DOes yours really work? |
|
Diane Choksondik
University of Caille Gallente Federation
0
|
Posted - 2014.03.01 12:36:00 -
[21] - Quote
This is a bit ********. Cannot login for the life of me. Maybe fix, CCP?! |
Miriya Zakalwe
Rifterlings Point Blank Alliance
90
|
Posted - 2014.03.01 12:53:00 -
[22] - Quote
Muestereate wrote:DOes yours really work?
FAQ
Q: Does your Eve's First 100% Legitimate IP Packet Doubling Scheme work? A: Can you login? No? See what I did there? |
|
|
|
Pages: 1 :: [one page] |