drmike
100% Tier-1 Gogent
Not my typical schtick, but times are changing and I give out brownie points for good behavior when I think folks deserve it.
This comes to us from the shadowy underside of the net, one of those black background, hack oriented communities.
HackForums has a related thread about this:
http://webcache.googleusercontent.com/search?q=cache:CIRHZUcbCoUJ:http://www.hackforums.net/archive/index.php/thread-4692889-1.html+&cd=2&hl=en&ct=clnk&gl=us
In the HF thread it talks a bit more about it.
What ColoCrossing did is put rate limiting cap in place. If a server on CC's network hits 500Mbit for over 10 minutes, it gets rate limited at 100Mbit for next 48 hours.
Why does this matters to DDoS / stresser folks? 1/10th of their pipe speed with that.
So I applaud CC on being creative here and dealing a blow to the web stressers / DDoS attackers / etc.
Still should deal with the BGP standard circa 2000 that does away with spoofing. I head they claim enabling such causes other stuff to get dropped in their network. Wondering what is up with that and if this inability to BGP smack the problem out isn't lack of proper BGP router still. But that's above my pay scale. Ideally some BGP person can comment.
Big applause to CC for reigning in abuse a bit. Let's see more of this.
This comes to us from the shadowy underside of the net, one of those black background, hack oriented communities.
That was as of a few days ago.So, ColoCrossing is the most commonly used server provider that allows IP spoofing, Meaning you can amplify the attack to a much higher power.
Their bandwidth monitor wasnt working so they couldnt tell who was sending the attacks or how much they were sending, Well guess what,
They fixed it.
Now every web stresser that runs off of a reseller of ColoCrossing (HudsonValleyHost, EnWebHost, GreenValueHost etc) is going to have all their servers rate limited to roughly 5mbit/s upload.
Being that 90% of web stressers run on a CC reseller, about 90% are going to fail.
I lost all my servers to this, but I know a lot of people that work in datacenters so I wont have an issue keeping mine up.
HackForums has a related thread about this:
http://webcache.googleusercontent.com/search?q=cache:CIRHZUcbCoUJ:http://www.hackforums.net/archive/index.php/thread-4692889-1.html+&cd=2&hl=en&ct=clnk&gl=us
In the HF thread it talks a bit more about it.
What ColoCrossing did is put rate limiting cap in place. If a server on CC's network hits 500Mbit for over 10 minutes, it gets rate limited at 100Mbit for next 48 hours.
Why does this matters to DDoS / stresser folks? 1/10th of their pipe speed with that.
So I applaud CC on being creative here and dealing a blow to the web stressers / DDoS attackers / etc.
Still should deal with the BGP standard circa 2000 that does away with spoofing. I head they claim enabling such causes other stuff to get dropped in their network. Wondering what is up with that and if this inability to BGP smack the problem out isn't lack of proper BGP router still. But that's above my pay scale. Ideally some BGP person can comment.
Big applause to CC for reigning in abuse a bit. Let's see more of this.