New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
seflow review - stay far away: Scammers and liars
This discussion has been closed.
Comments
Which LET user are you going to accuse of doing it this time?
Otherwise known as a hot cosby
Legality is not the only thing most people care about, you amoral fuck.
Whoa now. But I think it really ought to be illegal to even "test" DDoS protection you have bought unless the test is approved by the DDoS protection provider.
Even if it's approved by the DDoS protection provider, how do you do the testing exactly? Do you buy / rent a "booter"? These are usually botnets of hacked computers. So you'd have to pay for renting a botnet of hacked computers. You pay for something clearly illegal, for illegally using third party computers (without consent of the owners of these computers). I don't think there are countries where doing this is legal.
I think the DDoS protection testing industry is based on layers of plausible denial that make the above state of affairs quasi-legal (for everyone above "L0" = botnet operator).
Seriously speaking, there are 100% legal services that operate based on co-located servers and paying the bandwidth bills. That doesn't come cheap, of course.
What I don't like the most, that there isn't any kind of compensation -- e.g. my VMs were down for hours on multiple ocassions, almost to the point of couple of times each week, and while that's fixed in the end, it's simply "oh a storage controller failure, oh something else, well tough shit", or this DDoS where we had 90% PL for 5 hours (basically until the business day in Italy started, so I guess DDoSers can DOS all night with no one to stop them...). A few EUR credit to those who were affected by all these downtimes would be nice. And no I am not going to beg for money in PM or via ticket. I believe the provider should decide things like these on their own.
I don't know if I can compare this company to the ones on LET, but digitalocean give credit automatically to clients when an issue arises, such as downtime of a node, even if its only 5-30 mins..
Have you cloudflow or flexcloud product? Please also remember that ddos is still incoming so we not already closed the case...
Our entire ip range is being ddosed from 3 a.m. cest. You're not experiencing new packetloss because we're filtering it, but is still in progress.
This is pretty much what most people do to legally DDoS a server, because they don't really have other way to get a cheap UDP DDoS attack test. If you want to test Layer7 (D)DoS protection (HTTP for example) things are better, because you can just spin up a VPS or two and start benchmarking it with tools such as Apache Bench and Siege. These don't really cause any network damage (lag to your VPS neighbors and etc) as long as you don't go crazy with it...
Hmm, if the topic title is true, then we will have most stupid CEO ever.
Basically everything is down with Seflow at the moment, the site, the manage part, our vsp nodes in Italy ...
Yes sorry, now attack is switched to ip transit provider. We're contacting them to fix because are out of our control.
I really hope you are not attacking your own infrastructure just to have a point in this conversation.
Are you tr1cky from high-minded?
OOFT! Big shots fired!!
So tr1cky does have a lot of firepower.
@matteob I do hope you are going to compensate your customers for this idiocy
No.
2 possibilities, either you have a lot of firepower or his capacity to mitigate the attack is too limited.
Or he is honest and never attacked them anyway. Otherwise he'd not be here by now. Not guilty until proven otherwise.
You missed one.
A common target is gateway ips or things like that which people dont protect. Most routers route gateway bound traffic in software, so even a 100k pps syn flood will knock even large scale routers offline with ease.
There is an easy fix I won't go into, but it isn't always possible.
Francisco
I'm sure it is the same tr1cky from high-minded. From what I've seen, high-minded is a forum focused on Counter Strike bot manipulation and hacks. The client base is mostly German and Russian. Revenue is earned by members upgrading the account.
Currently you are filtering all traffic towards Online.net:
Maybe to many other destinations as well, but that's just what I noticed.
upd, another one: www.kddi.com
Could you kindly share the fix?
Or he doesn't understand his ISP dropped the announcement.
It's back now via NTT, uplink likely just had him the null-route.
No we're own our filtering, why online.net?
Attack to our ips is filtered. Actual problem is the attack moved on transit ip router interface that is out of our control. We contacted ntt and level3 to fix their side, this is the problem.
Well.. filtering traffic, removing announcement, same right?
Yes and there is a fix for that but it isnt always possible
I'm not saying anything else since you & I had our problems last year too. I've left it alone though since there was no reason for more fuel.
Francisco