Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


how to achieve 980Gbps ddos protection as a hoster - Page 3
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

how to achieve 980Gbps ddos protection as a hoster

13»

Comments

  • jackbjackb Member, Host Rep
    edited December 2018

    @diegoxD said:
    It's not so hard for them to advertise 980 Gbps scrubbing capacity as one of their Tier2 providers (NFO) has 1800 Gbps in NL

    The problem there is then advertised numbers mean very little.

    E.g. let's say advertising in that manner is OK and cogent accepts flowspec rules or has some other configurable way of doing filtering. I don't use cogent so I don't know if this actually exists.

    Now a singlehomed cogent provider can advertise 227Tbps DDoS mitigation, since cogent has that capacity. But realistically they won't get close to that.

  • ClouviderClouvider Member, Patron Provider

    @jackb said:

    @diegoxD said:
    It's not so hard for them to advertise 980 Gbps scrubbing capacity as one of their Tier2 providers (NFO) has 1800 Gbps in NL

    The problem there is then advertised numbers mean very little.

    E.g. let's say advertising in that manner is OK and cogent accepts flowspec rules or has some other configurable way of doing filtering. I don't use cogent so I don't know if this actually exists.

    Now a singlehomed cogent provider can advertise 227Tbps DDoS mitigation, since cogent has that capacity. But realistically they won't get close to that.

    I don’t know of a single Tier 1 that accepts pure FlowSpec from the Customer.

  • jsgjsg Member, Resident Benchmarker

    @diegoxD said:
    It's not so hard for them to advertise 980 Gbps scrubbing capacity as one of their Tier2 providers (NFO) has 1800 Gbps in NL (100+400+100+200+200+200+400+200) https://www.nforce.com/infrastructure.

    From what I see those are typical port and fiber specs and are almost certainly not even close to real bandwidth. Also note the somewhat meager bandwith to the FRA and LON IXs (which is a quite good indicator).

    @Clouvider said:
    I don’t know of a single Tier 1 that accepts pure FlowSpec from the Customer.

    That. Plus flowspec can be "abused" for DDOS mitigation but it's not good at it, at least not for larger and/or complex attacks.

  • SplitIceSplitIce Member, Host Rep

    BGP flowspec can also be really expensive to execute. I know of one network that tried to implement it and ended up on largely all software paths through the router.

  • @Blazingfast_IO said:
    We do not have any relation to Hyperfilter and we do not resell/use protection from third parties.

    but but but nforce?

  • ClouviderClouvider Member, Patron Provider
    edited December 2018

    @SplitIce said:
    BGP flowspec can also be really expensive to execute. I know of one network that tried to implement it and ended up on largely all software paths through the router.

    It can be implemented right however and with the right gear offers excellent heavy lifting capabilities right at the edge of the network.

    Thanked by 1jh_aurologic
  • something very strange and very polite is going on here.

  • SplitIceSplitIce Member, Host Rep

    @Clouvider What gear can execute full BGP flowspec without falling through hardware acceleration to software routing?

    Hardware acceleration is very important for most edge routers as it's not bit volume that poses the most difficulty to mitigate these days - typically it's throughput (PPS).

    FYI Unfortunately Skypes purged that conversation I had with them from the chat history. I do know they run some MX480's not sure if thats where they were attempting to execute the filters however.

  • Blazingfast_IOBlazingfast_IO Member, Host Rep

    The answer to how it's possible to filter 980 Gbps was already covered in this thread by the members.

    It's obviously not cheap but not so hard in NL to have access to high bandwidth for filtering DDoS attacks. Also when launching services in new locations like China, West Europe and soon USA the available banwdwidth to filter attacks will grow day by day. However you should note that just by having access to the bandwidth isn't good enough to stop the attacks.

    Even if volumetric attacks can be handled, there are many attacks on the applicational layer 7 aiming to take down UDP applications (e.g. TeamSpeak) or TCP (e.g. HTTP) using low bandwidth.

    BlazingFast has proprietary solutions, developped by our engineers and running on custom hardware that can handle both high bandwidths and high packes per second, scrubbing the "dirty" bandwidth. As we have our own scrubbing system and methods, currently BlazingFast does not buy scrubbing from any other company.

    However we sell anti-DDoS tunnels over GRE or IP-IP to protect servers hosted with any provider that wish to have additional protection and handle higher bandwidth attacks:

    Let's say a Customer has a 1, 10 or even 40 Gbps server hosted with provider "A" and wishes to have additional protection. We can protect the customer from those high bandwidth or applicational attacks without the need for the Customer to build an own complex solution or expensive bandwidth that he would never need, except when receiving high bandwidth DDoS attacks.

    We trust our protection is very well positioned, when compared to our competitors. That's why BlazingFast keeps growing and has customers moving every day from the said "big companies" that have WAF systems easily bypassed by attackers and provide us a good feedback after moving to us.

  • jackbjackb Member, Host Rep
    edited January 2019

    @Blazingfast_IO said:
    The answer to how it's possible to filter 980 Gbps was already covered in this thread by the members.

    It wasn't really though. A few people (including myself) speculated; but the conclusion was either

    1) you have the uplink capacity and filter yourself
    2) you don't have the uplink capacity and upstream applies your filters

    You've said before you don't use anyone elses protection, but some posters have inferred you don't have 1tbps transit. Both can't be correct surely. My assumption would be upstreams are applying your filters before your network which is how you can reach such a level of protection -- but this is something you've already denied?

  • Blazingfast_IOBlazingfast_IO Member, Host Rep

    As you all know, all the techniques covered during this post that imply flowspec and similar technologies aren't true "scrubbing". If you have let's say 200 Gbps against port "xxxx" and you ask your upstream to simply apply "filters" on port "xxxx", legitimate clients would be dropped together with the "dirty" bandwidth.

    As we have our own technologies, to apply them and clean malicious traffic we need to receive all traffic (good+bad) so we can filter the bad, thus we need to have capacity to filter ourselves and 1) applies.

  • jsgjsg Member, Resident Benchmarker
    edited January 2019

    I think we'll have an answer when some day a real and massive DDOS against blazingfast.io is performed.

    My guess: They'll break about as fast as you can say "DDOS". Reason: Based on blazingshost.io's very vague statements I see absolutely no reason to believe that they could do what many bigger companies failed to do. My take is that they have built some home-made solution that will break once an attack goes beyond maybe 50, maybe 80 Gb/s.

    We'll see. Or we'll finally get some tangible and credible info from them. I don't hold my breath however.

    So, from what I see it's a clear STAY AWAY!

    Thanked by 1eol
Sign In or Register to comment.