Author |
Thread Statistics | Show CCP posts - 6 post(s) |

Atum
Eclipse Industrials Quantum Forge
110
|
Posted - 2014.09.22 18:44:00 -
[1] - Quote
Analeesa wrote:Hate to have to ask but is there no hope for better mitigation in the near future? Not really... DDoS attacks are stupidly easy to initiate, and damn near impossible to stop. A quick (and oversimplified) description of how a normal internet connection works, using web browsing as an example...
Client walks up to Server and knocks on door #80. Server opens the door, says "Hey, how are ya? Which of your pipes should I send the webpages back through?" Client says "Ehh, #2503 looks pretty bored, use that one." Server says "Ok, here's your webpage. Happy surfing!"
In a DDoS, though, the process looks like this: Zombie walks up to Sever and knocks on door #80 Server opens the door, says "Hey, how are ya? Which of your pipes.....?" Zombie stands there like a... well... like a zombie. Server says "Uhh, dude, you knocked on the door. How do you want this?" Zombie wobbles a little, maybe mumbles something to the effect of "Braaaaaiiiiinnnnnnssssss......" Server says "No, really dude, you asked for it. I can even give you fries with that if you like." Zombie shambles down the street, dropping a limb here or there for good measure. Server says, "What a freak, I give up." Zombie slowly stumbles back and starts the process all over again.
Basically, the idea is that a normal connection is quick and over with. A DDoS, though, ties up the server's resources as it's sitting there, waiting for the zombie (and that's what botnet victims are generally called) to actually complete the service request. That resource exhaustion is what eventually causes the server to crash out (or in our case, disconnect the socket). |

Atum
Eclipse Industrials Quantum Forge
110
|
Posted - 2014.09.22 20:49:00 -
[2] - Quote
Christopher AET wrote:I drain ducks of their moisture for sustenance. I wasn't aware that there even WERE ducks on Arrakis. |

Atum
Eclipse Industrials Quantum Forge
111
|
Posted - 2014.09.29 21:39:00 -
[3] - Quote
CCP Explorer wrote:We have various ways to defend against these attacks. What you see is the impact of some of the DDoS attempts, the many attempts we successfully deflect, scrub or blackhole you don't see (and we don't talk about them). Curious... are the attacks just that much bigger than they were in the past, or is the nature of the traffic they're sending changing? Used to be people could just PING flood, then it became SYN floods, and now we're on to DNS and (one which I saw a couple months ago) NTP. |

Atum
Eclipse Industrials Quantum Forge
111
|
Posted - 2014.09.30 01:45:00 -
[4] - Quote
Don't think I've ever seen this one before... logged in about 0145 EVE time, got the message "The user's connection has been usurped at the proxy." A second client then kicked up automagically (the first was still at a black screen as I typed this) and logged in normally. SHIFT-ALT-Q appears to have closed that black-screen client cleanly (wasn't locked/frozen). |

Atum
Eclipse Industrials Quantum Forge
111
|
Posted - 2014.11.14 16:50:16 -
[5] - Quote
Strander wrote:Come on CCP talk to us. This. Is it Telia's fault (as many seem to suspect)? Are the DDOS attacks ongoing? Is there a bug in the load balancing mesh? The lack of ongoing communication is just as frustrating as the disconnects themselves. |

Atum
Eclipse Industrials Quantum Forge
112
|
Posted - 2014.12.09 17:06:38 -
[6] - Quote
Fiddler Hays wrote: 1 eveonline-ic-138015-ldn-b3.c.telia.net (213.248.83.198) 0.586 ms !X 0.565 ms !X *
Unfortunately, for any further troubleshooting with our customer, you would have to raise a ticket with your provider, we are only business support. ... So I'd say its an issue with CCP and there router.
If it's CCP's router, why does it resolve to a Telia domain? |
|
|