New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
Yes, maybe your upstream does not check ROA. But what about all other ASNs in the as_path? They may check ROA and discard routes on their own...
Having wrong ROA is bad
Having no ROA is fine
Having ROA is even better
As you can see, ROA is set and valid
ROA was invalid until a short time as you can see on bgp.he.net :-) It may be valid now.
how about antiddos dude ?
why like weak protected diffrent like what you saying server have 40GB/s antiddos
I also see valid ROA
We currently have up to 60Gbit over two different Upstream Providers in two different Datacenters which act as Anycast Mitigation Plattform.
Try it out and then post prove, that it didnt work.
To clarify: Customer tried to Flood his server with random source/destination UDP packets. Its technically not possible to filter out Floods with no mitigation pattern, because this type of traffic could be also valid traffic - as I know, other providers as Voxility or OVH also can't handle UDP Floods without further (manual) investigation in case an attack has no known attack pattern.
In the future, we will provide an simple Anti-DDoS Firewalling feature in our customer area, where you could ACCEPT/DROP TCP/UDP/ICMP Traffic from Source/Destination Ports (except ICMP) and IPs. If an customer gets hit by an unknown attack pattern and it affects virtualization nodes, the destination ip address gets nullrouted globally and our network admins investigate manually (custom ruleset).
@Kabeldamagement
testip please
how about torrent for personal usage?