We at HostHatch also offer protection through Staminus. $5/mo and in two locations - Amsterdam and Los Angeles.
We offer both free and paid versions of DDoS protection. Free comes standard.
@LimestoneNetworks I am also interested in hearing what the free version of DDoS protection covers. Also do you do colocation yet?What does free cover?
Francisco
Hi, I'm very sorry to have missed your inquiries. I've been seriously busy.@LimestoneNetworks I am also interested in hearing what the free version of DDoS protection covers. Also do you do colocation yet?
End of Reality is pleased to announce a new level of DDoS protection now active on all of our services in Los Angeles, California at no extra cost! We now offer up to 10gbps / 20million PPS of protection and onsite traffic scrubbing in our LA facility.
This truly a first for the hosting industry - we now have a 100% Premium Bandwidth (Internap Performance IP) DDoS protected network!
End of Reality... who is doing their filtering?add this one to the list and the DDoS protection is free (and not from OVH)...
VPSBoard exclusive, I guarantee you will never see this one featured on LowEndBox.
from an email that just arrived...
They're getting the filtering in LA through Internap and Internap is using Proxlexic. The DC for the LA location is CoreSite, singled homed to Internap. The LA location is using AS63018 IPs (losangelesdedicated.net, also owned by Robbie) .End of Reality... who is doing their filtering?
X4B was getting hit by some kind of PHP based L7 (UA pattern "PHP"), a cache buster pattern "/?=[num]" and a Joomla reflection attack earlier today. Not wrecking my day, couldn't care less. Aside from burning some bandwidth, pretty harmless. Its what we get for posting on LET these days. But yes, competent techs wrote that systemcertain types of attacks (L7, etc) can really wreck your day regardless of your filtering
I am just talking pre-emptive measures, something that might help me sleep at night should the worst happen.It also depends on what you're running - certain types of attacks (L7, etc) can really wreck your day regardless of your filtering if you don't have competent techs ready to analyse and adjust to the attack.
less than 20Gbps is probably 80-90% of attacks. Perfectly fine if you aren't an attack magnet. More and more game servers, and similar attack magnets are needing >20Gbps now days. But not everyone needs it.
My recommendations would be:
2-4Gbps: Dont bother. Only people hitting this low are free stressers, might as well go for something a bit bigger, it wont cost much more.
4 - 10Gbps: Small Buisness / Small Service / Small personal site / etc - non attack magnet
10-20Gbps: Have been attacked before, or forsee it being likely. Anyone with a tech orientated audience should consider this (more likely to know strong stressers)
20-100Gbps: Popular Game servers, Popular Sites, Minecraft (!) etc
100Gbps+: If you are thinking about this, you probably wouldn't be asking on a public forum. Or you are unlucky.
Of course if you are reading this in the future factor in sizeable increases. 20Gbps is the 10Gbps of last year.
The US side of our site (we have two termination points) got hit with ~120Gbps last night (and a decent amount of Layer7). Usually attacks of that size are all amp (and this was), and if you have hardware ACLs and a decent amount of connectivity you can tank them.
Unfortunately the stressers only need say ~1gbps 10-20 servers (may even be less) and some decent amp lists.
Yep. Yep. Even more Yep.X4B was getting hit by some kind of PHP based L7 (UA pattern "PHP"), a cache buster pattern "/?=[num]" and a Joomla reflection attack earlier today. Not wrecking my day, couldn't care less. Aside from burning some bandwidth, pretty harmless. Its what we get for posting on LET these days. But yes, competent techs wrote that system
If you have the tools at your disposal it really shouldnt bother you. Things like: semanic filtering (slowloris, rudy etc), static patterns, dynamic mitigation and user verification. Combine that with a ACLs for repeat offenders in an attack incident and you can usually ride through L7. L7 is usually much more reduced than L4 attacks since actual compromised machines (or compromised web services) are needed, not spoofing. This also opens the door for all kinds of analysis that you couldn't normally perform at L4-
The list goes on, you just need to think of all the factors and come up with algorithms to turn values into the correct result.
- what client is it?
- what does fingerprinting say? does it match?
- what happens if we spit out some browser verification js, does the right result get returned?
- is the IP a server?
- does this traffic resemble what we saw yesterday?
- has this ip previously been involved in L7 attacks? what about its neighbourhood?
- is TOR?