Page 2 of 5 FirstFirst 12345 LastLast
Results 26 to 50 of 121
  1. #26
    Join Date
    Feb 2008
    Location
    Larkspur, CO
    Posts
    9
    The odd thing is that this all just popped up all of a sudden so WHB changed something in the middle of the night.

    I've had over 20,000 files on the server for months and the error saying I'm only authorized for 10mb when I should have 6 or so gigs of space allocated.

    An hour ago, a different tech (Alexey K) updated my ticket with:

    Hi,

    I have modified pure-ftpd.conf as you request.
    Please check it now and contact us in case of any further troubles.
    Regards,
    Alexey K.
    A better attitude from this tech than I've experienced and I'm almost good with the explaination of what was done. I would have liked to know what exactly was modified in the pure-ftpd.conf, but I'm not sure if it'd really be relevent to a lot of users and might confuse them or something. But I'm pretty fluent about what's going on with servers and would like to be able to say "why the heck did you do that?!" Or "You're looking in the wrong place, try here".

    With the errors that I'm getting, it would appear that someone set my quota really low, maybe a batch job in the middle of the night to reset a group of users to make sure they were in the right quota limit was run and somehow I got mixed into the group by mistake.

    I still don't understand the comment about not having to wait longer than 25 minutes with any of my tickets (with the example above - I have time stamped emails to prove it all and WHB's ticket system is also coinciding with the delays). Again with this ticket, last update was 12 hours ago.

    Will keep updating here...

    Bryan
    Last edited by swampy101; 02-13-2008 at 07:05 AM.

  2. #27
    Join Date
    Feb 2008
    Location
    Larkspur, CO
    Posts
    9
    And this is what I'm talking about with the confusing tickets. While I'm monitoring the tickets through email, if I log into my account on WHB, I show two open tickets, one waiting for staff response with nothing but my original text in it, and the second one with my original text and the whole trail of what's been going on.

    Why two tickets?

    VJO-463838: Can't upload files
    13 Feb 2008 10:44 AM Bryan | Awaiting Staff Response | Urgent | Technical Support

    BAA-132217: Can't upload files
    13 Feb 2008 11:10 AM Bryan | Awaiting Staff Response | Urgent | Technical Support
    Last edited by swampy101; 02-13-2008 at 07:28 AM.

  3. #28
    Join Date
    Feb 2008
    Location
    Larkspur, CO
    Posts
    9
    Interesting. They're changing my disk space allocation in the wrong place.

    Yesterday, when I check cpanel for my account, It said:

    Disk Space Usage 978.13 Megabytes
    Disk space available 6021.87 Megabytes

    This morning, it says:

    Disk Space Usage 0.03 Megabytes
    Disk space available Unlimited Megabytes

    Where ever they changed it, it's the wrong place and a good troubleshooter should have known this since the error I'm getting is that my quota is only 10mb and previously in Cpanel, my space was set to 6gb.

    It's not my FTP program either.

    Before I even attempt to upload any files, right at login, I get the message:
    230-29951 files used (9%) - authorized: 300000 files
    230 1612015 Kbytes used (157%) - authorized: 1024000 Kb

    Whether it be from my file manager or if I ftp in from a dos prompt.

  4. #29
    Join Date
    Feb 2008
    Location
    Larkspur, CO
    Posts
    9
    Back to the double ticket thing.

    So I just got updated on BOTH tickets this time.

    The ticket with only my issue in it, the BAA ticket was updated by yet another tech with:

    Dear Customer,

    Your quota-related issues is fixed, please check.
    Looking forward to your answer.
    Regards,
    Evgeniy L.
    Uh, it's not fixed.

    Then 7 minutes later, the other ticket with the whole trail in it was updated with:

    Dear Customer,

    For us to be able to help you, please provide to us your login information (login and password to FTP).
    Looking forward to your answer.

    Regards,
    Evgeniy L.

  5. #30
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,931
    Bryan,

    As mentioned, I suspect the ticket ID is being removed when you reply via email and the helpdesk was parsing it to a new/different ticket.


    Dan, we don't place file limits (I know plenty do) on how many files you can upload. The limit shouldn't have been in place and has thus been increased and we'll set it to something that is very unlikely to be hit in due course -- most of our system administrators have been working on kernel upgrades in the last 24 hours, for obvious reasons.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.easywp.com - True Managed WordPress, made easy

  6. #31
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,931
    Quote Originally Posted by Nnyan View Post
    I don't have any personal experience with WHB and I'm glad to see them take a proactive stance here in WHT, that's always a good sign to see an active presence (at least IMHO).

    Having said that I would be more then a bit concerned about the pricing/resources ratio, 1TB of bandwidth for $35/mo strikes me as fairly significant overselling. Now if WHB can pull that off while still providing quality service and support then awesome! But I'm a cautious fellow and I tread carefully with my accounts.

    @swampy101
    You've been with them three years and have put up with all these issues for that long? Was it fine for awhile and it got worse or what? I have trouble understanding why anyone would stick around for THREE years with (what you claim to be) bad service even for a personal website.
    Everyone has their opinion on overselling. However, we wouldn't have got to where we were without providing good service.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.easywp.com - True Managed WordPress, made easy

  7. #32
    Join Date
    Feb 2008
    Location
    Larkspur, CO
    Posts
    9
    Matt is awake finally and just closed the duplicate ticket and is on top of things again.

    Edit: I'm not giving Matt a hard time about having to sleep or anything, just updating. Everyone has to sleep sometime, however, I expect a tech to finish the job or pass it on to another tech after his/her shift is over.

  8. #33
    Join Date
    Feb 2008
    Location
    Larkspur, CO
    Posts
    9
    Quote Originally Posted by mdrussell View Post
    Bryan,

    As mentioned, I suspect the ticket ID is being removed when you reply via email and the helpdesk was parsing it to a new/different ticket.
    Matt, I just double checked in my sent box and all of my replies contain "Re: [#VJO-463838]: Can't upload files" (or the other ticket number) in the subject and contain the complete quoted text in the body.

    I'd send you a link to a screen shot of it if you wanted, but I can't upload files to my website.

  9. #34
    Join Date
    Jun 2002
    Location
    PA, USA
    Posts
    5,143
    swampy101,

    I strongly believe that very few of us here cares about your tickets updates. WHT is not a place for you to force/have your host to pay attention to you. Please continue these exchanges in private.
    Fluid Hosting, LLC - Enterprise Cloud Infrastructure: Cloud Shared and Reseller, Cloud VPS, and Cloud Hybrid Server

  10. #35
    Join Date
    Feb 2008
    Posts
    96
    Quote Originally Posted by FHDave View Post
    swampy101,

    I strongly believe that very few of us here cares about your tickets updates.
    Not about the ticket issue per se, but still would like to know how this issue is resolved and how the customer feels about the whole thing.
    WHT is not a place for you to force/have your host to pay attention to you.
    Seems like a good place to have yourself heard, and the community provides leverage...though it is not to be abused, for sure. Some of these issues should be draaged into the light of day so that we, as potential clients, see more facets of a service provider.
    Please continue these exchanges in private.
    Spare us the minutiae, yes...but do keep us informed.

  11. #36
    i do not know what are you saying about their email response after the purchase but i asked them 3 times and they answered me in 15 minutes.
    Elakbar world - video,images,games,flash files,articles,reviews,news,blogs from all the internet collected in on site. Easy to find anything. Submit your site/blog rss

    FreeLiveGames - More than 1700 free live games

  12. #37
    Quote Originally Posted by t2chen View Post
    1 post newbie, why am I not surprised?
    I have to agree his review is little suspicious.

  13. #38
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,931
    I am sure all of our clients will validate their responses if requested.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.easywp.com - True Managed WordPress, made easy

  14. #39
    I will certainly not be staying with them, today my server has been down for 8 hours so far and I have had three different excuses form them

    1, The hard drive failed
    2. Unfortunately data center switch, where the server is connected, is down now.
    We are working on this issue and we hope it will be solved in next 45-60 minutes. {This was posted on their forum 8 hours ago, but still they are down}

    3. They have changed IP address and are waiting them to propagate. Here is the exact support dialect;

    Olga T.: Hello! Welcome to Webhostingbuzz Live Support, how can I help?
    Me: My server has been down for 8 hours now and I am losing customers
    Olga T.: give me please your domain name
    Me: my-domain.com
    Me: 209.51.xxx.xx
    Olga T.: yes, we aware about this problem
    Olga T.: We have changed main shared IP, but DNS propagation still requires time, so sites still may be offline
    Olga T.: sorry for inconveniences
    Me: Awful, unbeleivable and very unprofessinal, I will not be staying with you
    Olga T.: our techs are working on this issues
    Olga T.: please have a patience

    This company is very unprofessional, very unreliable and although very cheap in price it cost me quite a few customers making it a financial mistake to go with them. I have not been with them that long and have had many downtimes, this one takes the biscuit, my other provider Servint that I have been with for 4 years is by far the best ever company I have been with.

  15. #40
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,931
    Quote Originally Posted by Rayman224 View Post
    I will certainly not be staying with them, today my server has been down for 8 hours so far and I have had three different excuses form them

    1, The hard drive failed
    2. Unfortunately data center switch, where the server is connected, is down now.
    We are working on this issue and we hope it will be solved in next 45-60 minutes. {This was posted on their forum 8 hours ago, but still they are down}

    3. They have changed IP address and are waiting them to propagate. Here is the exact support dialect;
    Nowhere have we stated the hard drive failed. Initially one of the switches in a rack went down. Upon investigation, this was found to be the result of an inbount 2.5Gbit/sec DDOS attack against one of the servers in the rack, a reseller server. 2.5Gbit/sec is pretty damn hard to filter/mitigate so we decided to nullroute the ip address and setup a new shared ip address for any sites using the shared ip. This was made clear in multiple announcements.

    Olga T.: Hello! Welcome to Webhostingbuzz Live Support, how can I help?
    Me: My server has been down for 8 hours now and I am losing customers
    Olga T.: give me please your domain name
    Me: my-domain.com
    Me: 209.51.xxx.xx
    Olga T.: yes, we aware about this problem
    Olga T.: We have changed main shared IP, but DNS propagation still requires time, so sites still may be offline
    Olga T.: sorry for inconveniences
    Me: Awful, unbeleivable and very unprofessinal, I will not be staying with you
    Olga T.: our techs are working on this issues
    Olga T.: please have a patience

    This company is very unprofessional, very unreliable and although very cheap in price it cost me quite a few customers making it a financial mistake to go with them. I have not been with them that long and have had many downtimes, this one takes the biscuit, my other provider Servint that I have been with for 4 years is by far the best ever company I have been with.
    And as far as I can tell, this is what Olga explained to you.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.easywp.com - True Managed WordPress, made easy

  16. #41

    Web Hosting Buzz Down Again

    Thanks for your reply, yes Olgas version of events I had pasted in, for you information I have pasted in your other excuse below
    As mentioned previously I got 3 different excuses from you guys in total, maybe it is just a case of "you get what you pat for" You can go ahead and delete my accounts as "Elvis has now left the building" What a waste of time and money

    By the way the server is down yet again today.

    rs11 server technical problems
    Posted By: Matt R On: 26 Mar 2008 09:47 AM
    Details Outage related to disk/raid controller failure

    Unfortunately the hard drive and raid controller has failed in rs11. This has caused an extended outage which we apologize for. These are now being replaced.

  17. #42
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,931
    As we announced, the DDoS attack started up again and we're working on filtering it.

    RS11 and RS12 are different servers. RS11's raid issue is unrelated to this and was weeks ago.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.easywp.com - True Managed WordPress, made easy

  18. #43
    Join Date
    Aug 2002
    Posts
    1,612

    *

    DDOS or DOS attacks are something we cannot control and I am pretty sure no other web host here would be able to negate this fact too.

    We as a highly professional and responsible company have taken and would continue to take measures to prevent and sustain such acts of criminal deliberation.

    Such anti humanization acts by criminals of the modern world serve no good.

  19. #44
    Join Date
    Aug 2002
    Posts
    1,612

    *

    Just for the information of the folks who may or may not have an idea about what a DOS or a DDOS attack is ------ below is an article copied from the world famous encyclopedia

    A distributed denial of service attack (DDoS) occurs when multiple compromised systems flood the bandwidth or resources of a targeted system, usually one or more web servers. These systems are compromised by attackers using a variety of methods.

    Malware can carry DDoS attack mechanisms; one of the more well known examples of this was MyDoom. Its DoS mechanism was triggered on a specific date and time. This type of DDoS involved hardcoding the target IP address prior to release of the malware and no further interaction was necessary to launch the attack.

    A system may also be compromised with a trojan, allowing the attacker to download a zombie agent (or the trojan may contain one). Attackers can also break into systems using automated tools that exploit flaws in programs that listen for connections from remote hosts. This scenario primarily concerns systems acting as servers on the web.

    Stacheldraht is a classic example of a DDoS tool. It utilizes a layered structure where the attacker uses a client program to connect to handlers, which are compromised systems that issue commands to the zombie agents, which in turn facilitate the DDoS attack. Agents are compromised via the handlers by the attacker, using automated routines to exploit vulnerabilities in programs that accept remote connections running on the targeted remote hosts. Each handler can control up to a thousand agents.[5]

    These collections of compromised systems are known as botnets. DDoS tools like stacheldraht still use classic DoS attack methods centered around IP spoofing and amplification like smurf attacks and fraggle attacks (these are also known as bandwidth consumption attacks). SYN floods (also known as resource starvation attacks) may also be used. Newer tools can use DNS servers for DoS purposes. (see next section)

    Unlike MyDoom's DDoS mechanism, botnets can be turned against any IP address. Script kiddies use them to deny the availability of well known websites to legitimate users.[6] More sophisticated attackers use DDoS tools for the purposes of extortion — even against their business rivals.[7]

    It is important to note the difference between a DDoS and DoS attack. If an attacker mounts a smurf attack from a single host it would be classified as a DoS attack. In fact, any attack against availability would be classed as a Denial of Service attack. On the other hand, if an attacker uses a thousand zombie systems to simultaneously launch smurf attacks against a remote host, this would be classified as a DDoS attack.

    The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack machine, and that the behavior of each attack machine can be stealthier, making it harder to track down and shut down. These attacker advantages cause challenges for defense mechanisms. For example, merely purchasing more incoming bandwidth than the current volume of the attack might not help, because the attacker might be able to simply add more attack machines.

    Although most DDoS attacks are malicious in nature, the same technique can be used to aid the Internet community. Internet fraud schemes, such as Nigerian 419 scams or phishing, commonly involve fraudulent websites that either impersonate a real website for purposes of stealing the victim's identity, or lend credibility to a scammer's fictional business venture to lure the victim into a false sense of confidence. Scam baiters, who combat these scams by posing as victims for the purpose of wasting the scammer's time and money and obtaining information that can be used by authorities, will forward sites they encounter during the course of their conversations to groups that specialize in site-killing.[citation needed] The group will first try to have a site taken down by informing the host of said site that the site is being used fraudulently. In the case where that approach fails, the group will organize a "takedown" of the site by encouraging its members to visit the site en masse and continually refresh its content (an intentional form of the Slashdot effect sometimes referred to as flash mobbing, although that term is technically reserved for real-world gatherings). Alternately, some groups have special web pages that link to images hosted by these fake sites and show the images to visitors (usually members or supporters of the site-killing group) while constantly reloading them, which is known as intentional bandwidth hogging.[citation needed] The purpose, similar to malicious DoS attacks, is to (a.) rapidly consume all of the website's allocated monthly bandwidth, after which requests for the site's content are refused, (b.) draw the attention of the site's host, who when faced with the constant onslaught on the entire hosting network's resources, will usually remove the site, and/or (c.) take up all available connections and maximum throughput of the host so that would-be victims cannot access the site.

    [edit] Reflected attack

    A distributed reflected denial of service attack (DRDoS) involves sending forged requests of some type to a very large number of computers that will reply to the requests. Using Internet protocol spoofing, the source address is set to that of the targeted victim, which means all the replies will go to (and flood) the target.

    ICMP Echo Request attacks (described above) can be considered one form of reflected attack, as the flooding host(s) send Echo Requests to the broadcast addresses of mis-configured networks, thereby enticing many hosts to send Echo Reply packets to the victim. Some early DDoS programs implemented a distributed form of this attack.

    Many services can be exploited to act as reflectors, some harder to block than others.[8] DNS amplification attacks involve a new mechanism that increased the amplification effect, using a much larger list of DNS servers than seen earlier.[9]

    [edit] Unintentional attack

    This describes a situation where a website ends up denied, not due to a deliberate attack by a single individual or group of individuals, but simply due to a sudden enormous spike in popularity. This can happen when an extremely popular website posts a prominent link to a second, less well-prepared site, for example, as part of a news story. The result is that a significant proportion of the primary site's regular users — potentially hundreds of thousands of people — click that link in the space of a few hours, having the same effect on the target website as a DDoS attack.

    News sites and link sites — sites whose primary function is to provide links to interesting content elsewhere on the Internet — are most likely to cause this phenomenon. The canonical example is the Slashdot effect. Sites such as Digg, Fark, Something Awful, and the webcomic Penny Arcade have their own corresponding "effects", known as "the Digg effect", "farking", "goonrushing" and "wanging"; respectively.

    Routers have also been known to create unintentional DoS attacks, as both D-Link and Netgear routers have created NTP vandalism by flooding NTP servers without respecting the restrictions of client types or geographical limitations.

    Similar unintentional attacks can also occur via other media, e.g. when a URL is mentioned on television. If a server is being indexed by Google or another search engine during peak periods of activity, or does not have a lot of available bandwidth while being indexed, it can also experience the effects of a DoS attack.

    [edit] Incidents

    The first major attack involving DNS servers as reflectors occurred in January 2001. The target was Register.com.[10] This attack, which forged requests for the MX records of AOL.com (to amplify the attack) lasted about a week before it could be traced back to all attacking hosts and shut off. It used a list of tens of thousands of DNS records that were a year old at the time of the attack.

    In July 2002, the Honeynet Project Reverse Challenge was issued.[11] The binary that was analyzed turned out to be yet another DDoS agent, which implemented several DNS related attacks, including an optimized form of a reflection attack.

    On two occasions to date, attackers have performed DNS Backbone DDoS Attacks on the DNS root servers. Since these machines are intended to provide service to all Internet users, these two denial of service attacks might be classified as attempts to take down the entire Internet, though it is unclear what the attackers' true motivations were. The first occurred in October 2002 and disrupted service at 9 of the 13 root servers. The second occurred in February 2007 and caused disruptions at two of the root servers.[citation needed]

    In February 2007, more than 10,000 online game servers like Return to Castle Wolfenstein, Halo, Counter-Strike and many others were attacked by "RUS" hacker group. The DDoS attack was made from more than a thousand computer units located in the republics of the former Soviet Union, mostly from Russia, Uzbekistan and Belarus. Minor attacks are still continuing to be made today.[citation needed]

    In late January 2008, a group calling themselves Anonymous began a DDoS attack on Scientology web sites as a part of an Anti-Scientology campaign called Project Chanology.[12]

    [edit] Prevention and response

    [edit] Surviving attacks

    The investigative process should begin immediately after the DoS attack begins. There will be multiple phone calls, callbacks, emails, pages and faxes between the victim organization, one's provider, and others involved. This can be a very time consuming process. It has taken some very large networks with plenty of resources several hours to halt a DoS attack.

    The easiest way to survive an attack is to have planned for the attack. Having a separate emergency block of IP addresses for critical servers with a separate route can be invaluable. A separate route (perhaps a DSL) is not that extravagant, and it can be used for load balancing or sharing under normal circumstances and switched to emergency mode in the event of an attack.

    Filtering is often ineffective, as the route to the filter will normally be swamped so only a trickle of traffic will survive. However, by using an extremely resilient stateful packet filter that will inexpensively[13] drop any unwanted packets, surviving a DoS attack becomes much easier. When such a high performance packet filtering server is attached to an ultra-high bandwidth connection (preferably an internet backbone), communication with the outside world will be unimpaired so long as not all of the available bandwidth is saturated, and performance behind the packet filter will remain normal as long as the packet filter drops all DoS packets.[14] It should be noted however, that in this case the victim of the DoS attack still would need to pay for the excessive bandwidth. The price of service unavailability thus needs to be weighed against the price of truly exorbitant bandwidth/traffic.

    [edit] Firewalls

    Firewalls have simple rules such as to allow or deny protocols, ports or IP addresses. Some DoS attacks are too complex for today's firewalls, e.g. if there is an attack on port 80 (web service), firewalls cannot prevent that attack because they cannot distinguish good traffic from DoS attack traffic. Additionally, firewalls are too deep in the network hierarchy. Your router may be affected even before the firewall gets the traffic. Nonetheless, firewalls can effectively prevent users from launching simple flooding type attacks from machines behind the firewall.

    Modern stateful firewalls like Check Point FW1 NGX & Cisco PIX have a built-in capability to differentiate good traffic from DoS attack traffic. This capability is known as a "Defender", as it confirms TCP connections are valid before proxying TCP packets to service networks (including border routers). A similar ability is present in OpenBSD's pF, which is available for other BSDs as well. In that context, it is called "synproxy".

    Comodo Firewall Pro has a built-in Emergency Mode which is activated when the number of incoming packets per seconds exceed a set value for more than the specified time, for example, more than 20 packets/sec for more than 20 seconds. If this happens, the firewall classifies it as a DoS attack and switches to Emergency Mode. In this mode, all inbound traffic is blocked except previously established and active connections, but outbound traffic is allowed. The packet number threshold and the time needed for verifying an attack can be adjusted by the user separately for TCP, UDP and ICMP. The firewall also has some other attack prevention mechanisms, like protocol analysis, checksum verification (so that the packets aren't altered since transmission) and NDIS protocol monitoring for attempts at making a DoS attack by using own protocols, thus outmaneuvering older firewalls.

    [edit] Switches

    Most switches have some rate-limiting and ACL capability. Some switches provide automatic and or system-wide rate limiting, traffic shaping, delayed binding (TCP splicing), deep packet inspection and Bogon filtering (bogus IP filtering) to detect and remediate denial of service attacks through automatic rate filtering and WAN Link failover and balancing.

    These schemes will work as long as the DoS attacks are something that can be prevented by using them. For example SYN flood can be prevented using delayed binding or TCP splicing. Similarly content based DoS can be prevented using deep packet inspection. Attacks originating from dark addresses or going to dark addresses can be prevented using Bogon filtering. Automatic rate filtering can work as long as you have set rate-thresholds correctly and granularly. Wan-link failover will work as long as both links have DoS/DDoS prevention mechanism.

    [edit] Routers

    Similar to switches, routers have some rate-limiting and ACL capability. They, too, are manually set. Most routers can be easily overwhelmed under DoS attack. If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter. Cisco IOS has features that prevents flooding, i.e. example settings.[15]

    [edit] Application front end hardware

    Application front end hardware is intelligent hardware placed on the network before traffic reaches the servers. It can be used on networks in conjunction with routers and switches. Application front end hardware analyzes data packets as they enter the system, and then identifies them as priority, regular, or dangerous. There are more than 25 bandwidth management vendors. Hardware acceleration is key to bandwidth management. Look for granularity of bandwidth management, hardware acceleration, and automation while selecting an appliance.

    [edit] IPS based prevention

    Intrusion-prevention systems (IPS) are effective if the attacks have signatures associated with them. However, the trend among the attacks is to have legitimate content but bad intent. IPSs which work on content recognition cannot block behavior based DoS attacks.

    An ASIC based IPS can detect and block denial of service attacks because they have the processing power and the granularity to analyze the attacks and act like a circuit breaker in an automated way.

    A rate-based IPS (RBIPS) must analyze traffic granularly and continuously monitor the traffic pattern and determine if there is traffic anomaly. It must let the legitimate traffic flow while blocking the DoS attack traffic.

    [edit] Side effects of DOS attacks

    [edit] Backscatter

    In computer network security, backscatter is a side-effect of a spoofed denial of service (DoS) attack. In this kind of attack, the attacker spoofs (or forges) the source address in IP packets sent to the victim. In general, the victim machine can not distinguish between the spoofed packets and legitimate packets, so the victim responds to the spoofed packets as it normally would. These response packets are known as backscatter.

    If the attacker is spoofing source addresses randomly, the backscatter response packets from the victim will be sent back to random destinations. This effect can be used by network telescopes as an indirect evidence of such attacks.

    The term "backscatter analysis" refers to observing backscatter packets arriving at a statistically significant portion of the IP address space to determine characteristics of DoS attacks and victims.

    An educational animation describing such backscatter can be found on the animations page maintained by CAIDA, the Cooperative Association for Internet Data Analysis.

    [edit] See also

    * Barrett Lyon
    * Black fax
    * Dosnet
    * Intrusion-detection system
    * Network intrusion detection system
    * Zombie computer

    [edit] Notes and references

    1. ^ Intrusion Detection FAQ: Distributed Denial of Service Attack Tools (trinoo and wintrinoo)
    2. ^ Understanding Denial-of-Service Attacks (US CERT)
    3. ^ "Advisory CA-1997-28 IP Denial-of-Service Attacks" (CERT)
    4. ^ Sop, Paul (2007). P2P Distributed Denial of Service Attack Alert.
    5. ^ The "stacheldraht" distributed denial of service attack tool
    6. ^ Intrusion Detection FAQ: Distributed Denial of Service Attack Tools: trinoo and wintrinoo
    7. ^ US credit card firm fights DDoS attack
    8. ^ Paxson, Vern (2001), An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
    9. ^ Vaughn, Randal and Evron, Gadi (2006), DNS Amplification Attacks
    10. ^ January 2001 thread on the UNISOG mailing list
    11. ^ Honeynet Project Reverse Challenge
    12. ^ Richards, Johnathan (The Times). "Hackers Declare War on Scientology: A shadowy Internet group has succeeded in taking down a Scientology Web site after effectively declaring war on the church and calling for it to be destroyed.", FOX News, FOX News Network, LLC., January 25, 2008. Retrieved on 2008-01-25.
    13. ^ NB: no link in this <ref - ie. without consuming much processing power
    14. ^ OpenBSD's pf is a packet filter some providers use for exactly this purpose. [1]
    15. ^ "Some IoS tips for Internet Service (Providers)" (Mehmet Suzen)

    [edit] External links

    * RFC 4732 Internet Denial-of-Service Considerations
    * W3C The World Wide Web Security FAQ
    * How to Prevent Denial of Service Attacks
    * cert.org CERT's Guide to DoS attacks.
    * surasoft.com - DDoS case study, concepts, and protection.
    * ATLAS Summary Report - Real-time global report of DDoS attacks.
    * newssocket.com An article regarding a DDoS for hire incident.
    * linuxsecurity.com An article on preventing DDoS attacks.
    * and Zombies:
    o Is Your PC a Zombie? on About.com
    o Intrusive analysis of a web-based proxy zombie network

  20. #45
    I am a customer in WHB for about 1.5 year. I did have minor problems and their support resolved them more or less.
    I confirm that for two full days the rs12 is not accessible for all accounts with shared-ip. They say they have a DDos attack and cut from routing all access to shared-IP causing all sites without a dedicated IP to be inaccessible.
    But:
    From the first day, in order to avoid the downtime, I request a dedicated IP, they send me the invoice in less than an hour, I paid them at once, and for 1.5 day they do not install the dedicate IP. Instead of that, they say that they will do it when everything will be ok for their server. This of course, does not happen when they are going to get money and it is at least unfair. And all my sites are down.

    Finally, it is a hosting provider that as no problem exists everything is ok, in the smaller problem you should have an alternative.

  21. #46
    Join Date
    Aug 2002
    Posts
    1,612
    From the first day, in order to avoid the downtime, I request a dedicated IP, they send me the invoice in less than an hour, I paid them at once, and for 1.5 day they do not install the dedicate IP. Instead of that, they say that they will do it when everything will be ok for their server. This of course, does not happen when they are going to get money and it is at least unfair. And all my sites are down.
    You would get a free IP address and your money would be refunded. Our technical team was working on the issue at hand as a priority. PM me your domain name and I would personally take care of this for you.

  22. #47
    @Forumsaddict
    It is impossible to send you PM.
    But tickets AMO-704645 and OJG-682192 can make the same.
    I will post results. Still no dedicated-ip nor money refunded.

  23. #48
    Finally,
    A dedicated IP address was given free of charge and money will be refunded back. That proves a quality in their service.
    I hope this issue was just a misunderstanding and everything will continue without problems.
    I did not have any serious problem except that, I was happy with their service and I have recommended webhostingbuzz to friends in past. And I do not want such cases to exist to services I recommend.
    Let's find out if this was a bad moment I should forget.

  24. #49
    WHB's online support can't do any tech support. The ticket support is good.
    The reseller servers are OK. The uptime is very good.

    If you use WHB's reseller, please pay more attention for its free domain names. You are not the real own of the free domains. You don't have the domain control panel. If you cancel your plan, you need pay $9 to cancel the account or pay $15 to transfer out.

    This year, one of WHB's reseller servers are attacked by hacker. All websites which are attacked can't be recovered because WHB use the same server to backup the data.
    Domain, Hosting and Reseller at http://www.hostdomainzone.com

  25. #50
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,931
    Quote Originally Posted by lwbbs View Post
    WHB's online support can't do any tech support. The ticket support is good.
    The reseller servers are OK. The uptime is very good.

    If you use WHB's reseller, please pay more attention for its free domain names. You are not the real own of the free domains. You don't have the domain control panel. If you cancel your plan, you need pay $9 to cancel the account or pay $15 to transfer out.

    This year, one of WHB's reseller servers are attacked by hacker. All websites which are attacked can't be recovered because WHB use the same server to backup the data.
    Our online live sales is exactly that - live sales and basic technical support (which is clearly stated).

    We also explain that you have the domain for as long as you have the hosting plan with us and if you cancel the account within the first year, you have to pay the $9 we paid to register the domain or transfer it to the registrar of your choice for $15. Assuming you never cancel the hosting plan, the domain is completely free. Again, we're not shady about this, this is all clearly stated in our TOS.

    I'm not sure which incident you're talking about but we haven't had any total data loss issues....
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.easywp.com - True Managed WordPress, made easy

Page 2 of 5 FirstFirst 12345 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •