Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


KMS-Hosting.com - Linux VPS (Germany, DDoS-Protected) - starting from 2€ / month | Prepaid - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

KMS-Hosting.com - Linux VPS (Germany, DDoS-Protected) - starting from 2€ / month | Prepaid

2»

Comments

  • patrick7patrick7 Member, LIR

    Yes, maybe your upstream does not check ROA. But what about all other ASNs in the as_path? They may check ROA and discard routes on their own...

    Having wrong ROA is bad

    Having no ROA is fine

    Having ROA is even better

  • jh_aurologicjh_aurologic Member, Patron Provider

    @patrick7 said:
    Yes, maybe your upstream does not check ROA. But what about all other ASNs in the as_path? They may check ROA and discard routes on their own...

    Having wrong ROA is bad

    Having no ROA is fine

    Having ROA is even better

    As you can see, ROA is set and valid ;)

  • patrick7patrick7 Member, LIR

    ROA was invalid until a short time as you can see on bgp.he.net :-) It may be valid now.

  • yhuzayhuza Member

    how about antiddos dude ?

    why like weak protected :) diffrent like what you saying server have 40GB/s antiddos

  • jh_aurologicjh_aurologic Member, Patron Provider
    edited July 2015

    I also see valid ROA

    @yhuza said:
    how about antiddos dude ?

    why like weak protected :) diffrent like what you saying server have 40GB/s antiddos

    We currently have up to 60Gbit over two different Upstream Providers in two different Datacenters which act as Anycast Mitigation Plattform.

    Try it out and then post prove, that it didnt work.

    To clarify: Customer tried to Flood his server with random source/destination UDP packets. Its technically not possible to filter out Floods with no mitigation pattern, because this type of traffic could be also valid traffic - as I know, other providers as Voxility or OVH also can't handle UDP Floods without further (manual) investigation in case an attack has no known attack pattern.

    In the future, we will provide an simple Anti-DDoS Firewalling feature in our customer area, where you could ACCEPT/DROP TCP/UDP/ICMP Traffic from Source/Destination Ports (except ICMP) and IPs. If an customer gets hit by an unknown attack pattern and it affects virtualization nodes, the destination ip address gets nullrouted globally and our network admins investigate manually (custom ruleset).

  • berndy2001berndy2001 Member
    edited July 2015

    @Kabeldamagement
    testip please

    how about torrent for personal usage?

Sign In or Register to comment.