Page 6 of 6 FirstFirst ... 3456
Results 126 to 140 of 140
  1. #126
    Join Date
    Apr 2006
    Posts
    81
    So you have many users in china or you are being attacked by many computers in china?

    Usually people don't say "im being ddosed by china" Is the DDOS attack also coming from anywhere else but china?

    I would suggest tho that if you make no money from having all of this traffic from china then block it anyway (attack or not).

    The funny thing about this is that Ive had customers blocked by china and it appears to be very easy to get china to block you if you have porn content. When my customers were blocked by china's firewall (http://en.wikipedia.org/wiki/Golden_Shield_Project) it affected the entire country (besides hong kong). So I guess you can start serving a lot of porn and then spam china with your porn and I'm sure your ip will be blocked. When it has happened to my clients I notice that the entire IP was blocked from the country. Type:
    "is my website banned in china" into google. It happens to a lot of people and there's tools to check if you're banned.

    I believe facebook and myspace are even banned.
    I'm telling you its EASY to get on the ban list in china and that's what you want.

    I can also help you get IP's that are already blocked by china.

    Good luck
    Last edited by Dcommunications; 08-04-2010 at 10:56 PM. Reason: update

  2. #127
    Quote Originally Posted by Dcommunications View Post
    I would suggest tho that if you make no money from having all of this traffic from china then block it anyway (attack or not).
    You didn't read the thread, did you?
    edgedirector.com
    managed dns global failover and load balance (gslb)
    exactstate.com
    uptime report for webhostingtalk.com

  3. #128
    Join Date
    Apr 2006
    Posts
    81
    Quote Originally Posted by plumsauce View Post
    You didn't read the thread, did you?
    Hi plumsauce. Take a chill pill

    I did read it maybe a week ago. Do you want me to read every post right now for you? Let me know how I can please you. Its really important to me that you approve of my post.
    Last edited by Dcommunications; 08-05-2010 at 02:54 AM. Reason: needed sarcasm

  4. #129
    Quote Originally Posted by Dcommunications View Post
    Hi plumsauce. Take a chill pill

    I did read it maybe a week ago. Do you want me to read every post right now for you? Let me know how I can please you. Its really important to me that you approve of my post.
    1) He said that the DDoS wasn't affecting him, just his upstream

    2) He said that a large portion of his customers are from China, and that losing traffic there isn't desirable.

    So yeah, you should've read the first few posts at least, prior to posting useless advice.

  5. #130
    Srin, I don't know you but imagine if you are getting annoyed with people throwing their 2 cents every once a while thinking they are coming with something that would fix the day while it isn't. Imagine how I am starting to feel about this.

    A couple of people came up with good ideas which we are actually in persuit of.

    However, the issue of peace and war dc's although we have 2 physical DC locations and different providers it is difficuilt to seperate chinese.

    Peering agreement with China Telecom is currently in consideration.

    Quote Originally Posted by Srin View Post
    1) He said that the DDoS wasn't affecting him, just his upstream

    2) He said that a large portion of his customers are from China, and that losing traffic there isn't desirable.

    So yeah, you should've read the first few posts at least, prior to posting useless advice.

  6. #131
    Join Date
    Nov 2005
    Posts
    1,224
    Quote Originally Posted by Jigy View Post
    Peering agreement with China Telecom is currently in consideration.
    That would be interesting if it's a (comparatively) low bandwidth peering interconnect. Announce your routes to China Telecom over peering, so that link absorbs (and starves) the brunt of the inbound flood.

    Legitimate outbound traffic TO China Telecom could be engineered so that the bulk of it is sent over your regular transit links, rather than over the (lower bandwidth) peering.

    The downside is legitimate requests (and ACKs) would contend for bandwidth inbound, but it does shift the burden of the flood onto China Telecom and off your transit providers.

  7. #132
    Join Date
    Aug 2006
    Location
    Ashburn VA, San Diego CA
    Posts
    4,615
    The downside is legitimate requests (and ACKs) would contend for bandwidth inbound, but it does shift the burden of the flood onto China Telecom and off your transit providers.
    It could also flap BGP sessions, dampen routes, and cause more issues than there are currently.
    Fast Serv Networks, LLC | AS29889 | DDOS Protected | Managed Cloud, Streaming, Dedicated Servers, Colo by-the-U
    Since 2003 - Ashburn VA + San Diego CA Datacenters

  8. #133
    True, but I have already responded their are better ways if we have peering with China Telecom to handle it. I'd rather not discuss them in public as they can be used to evade the procedure once (if) implemented.

  9. #134
    Join Date
    Jun 2007
    Posts
    188
    Quote Originally Posted by Mavus View Post
    Maybe an over kill idea, but eventually it will not be.

    And this is not true; there are clear rules of engagement for anti-terrorism teams and they sport more honor and discipline than most ever will.

    And what incentive do they have to follow them besides the assumption that both they and their commanders have a good nature (which I'm sure they do, but mistakes can be made) and when their is no oversight whatsoever.

    And in your response about china, the US and its' citizens are the Chinese's little peons because of the huge debt we owe them. We just haven't realized it yet.

  10. #135
    Join Date
    Jun 2009
    Location
    Washington
    Posts
    374
    Quote Originally Posted by scapeish View Post
    And what incentive do they have to follow them besides the assumption that both they and their commanders have a good nature (which I'm sure they do, but mistakes can be made) and when their is no oversight whatsoever.

    And in your response about china, the US and its' citizens are the Chinese's little peons because of the huge debt we owe them. We just haven't realized it yet.
    Who knows who are the pawns of whom? Nefarious agents in SE Asia or elsewhere?

    And who cares, last year it was the Russian Mafia, the year before that, some lackies in Eastern Europe and before that across the street in my city. Again, who cares, take them out!

    Build 'honey pots' and send in the hornets.

    All units are supervised, that is what it means to be civilized and to neutralize by the rules.

    Myraid blessings!


    And you think I am way off the mark?
    ABSF
    Arrogant Bastard Server Farm
    Built from scratch Data Center serving
    100 year-old Metaphysical Library

  11. #136
    Join Date
    Feb 2004
    Posts
    963
    I once routed a 10gbps ddos through softlayer through creative use of a proxy server. Best $30 add-on I'd ever spent at a hosting company!

  12. #137

    Thumbs up

    Quote Originally Posted by meyu View Post
    Then the attack target is still on your network. as I said only game servers get attack from China at this size. most of these game server owners do is change the ip if one of the ips is nullrouted due to the attack, or move to another server. Since you give so many ips to each server, it's really easy just to change IPs and move servers inside your network. Since the game server owner keeps changing ips and changing servers if it gets cancelled, the attacker has no choice but to attack your network randomly flooding the telecom international line because he gets tired to keep track of the actual ip of the game server. only thing you can do is find out what kind of game server they are hosting, what ports/protocals they use, and ban them all at once. until these game server owners move out of your network, i don't think the attack is going to stop.
    Yes!In accordance with this,meyu is chinese,he know this!

  13. #138
    Join Date
    Aug 2002
    Location
    Seattle
    Posts
    5,525
    Quote Originally Posted by a7a2 View Post
    Yes!In accordance with this,meyu is chinese,he know this!
    +1. meyu's comment is quite valid.

  14. #139
    Join Date
    Jun 2009
    Location
    Washington
    Posts
    374
    From some clues and comments on this whole matter, it seems there are some Chinese sympathizers two tier deep that have each their own perceived 'moral ground' to either allow or do these attacks on the game server folks servering China.

    No matter, it all stinks; ban/expel the whole mess to Hong Kong and let Chinese deal with Chinese.

    I will not really matter because the cost/hassle vs. not continues to take its toll until AS after AS get shunned etc., etc.
    ABSF
    Arrogant Bastard Server Farm
    Built from scratch Data Center serving
    100 year-old Metaphysical Library

  15. #140
    Join Date
    May 2001
    Location
    Syn City
    Posts
    147
    I know this thread is a couple months old but it's interesting to me.

    Getting the media's attention is a good idea, but I am afraid that no media want to run such a complicated peice of tech info.
    Have you considered hiring a PR agent to write a press release? Something less complicated sounding that might get picked up by online news/blogs and then possibly offline media? Shouldn't be too expensive.

    Have you also considered moving parts of your datacenter into China. It might force them to protect you more if indeed you're a paying client.

    You may have to think about hiring someone to take over the botnet too. This is completely possible. While legally and ethically it's questionable it's still a solution.

    But like I said before this is starting to be a burden on our carriers.
    Then isn't it their problem?

    We are now working with law enforcement agency against this.
    Great to hear.

    I know when I was a chief engineer at a previous worldwide company, we had attacks of this size a couple times a year. In those cases our upstream providers did most of the heavy lifting to correct the situation. The rest, we blackholed/tarpitted/dropped random packets, looked for retries, etc. There are some very interesting things you can do with the right gear. However, it's likely that gear is sitting with the upstream. That's why I recommend leaning on them as much as you can because they hold the real cards in this situation.
    That's what I was thinking. If this is effecting your upstream providers it's up to them to deal with it by having the necessary hardware and experience to stop its effects.

    I'll agree this is a form of cyber-terrorism.

    So after reading 10 pages and 6 weeks later....has the OP had any progress in this?

Page 6 of 6 FirstFirst ... 3456

Similar Threads

  1. crossover != 1 GBPS?
    By HNLV in forum Colocation, Data Centers, IP Space and Networks
    Replies: 15
    Last Post: 03-30-2009, 01:53 AM
  2. Anyone want to share 1 gbps in Milwaukee?
    By keefe007 in forum Other Hosting Offers
    Replies: 2
    Last Post: 09-19-2008, 01:49 PM
  3. EU 1 Gbps host needed
    By ddosguru in forum Dedicated Server
    Replies: 15
    Last Post: 07-13-2008, 02:18 PM
  4. Replies: 14
    Last Post: 11-22-2003, 05:40 AM
  5. Replies: 8
    Last Post: 11-13-2003, 10:14 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •