Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Massive Layer7 attack, more than 33 hours - Page 4
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Massive Layer7 attack, more than 33 hours

1246710

Comments

  • FlorinMarianFlorinMarian Member, Host Rep

    From what I noticed, I have a problem with the threads created by OpenLiteSpeed, namely they are active even after 20 minutes even if the IP address that made the requests has been banned in the meantime by iptables.
    I will have to figure out how to remove these threads in a much shorter time as it consumes a lot of CPU.

  • AXYZEAXYZE Member
    edited June 2022

    @FlorinMarian said:
    From what I noticed, I have a problem with the threads created by OpenLiteSpeed, namely they are active even after 20 minutes even if the IP address that made the requests has been banned in the meantime by iptables.
    I will have to figure out how to remove these threads in a much shorter time as it consumes a lot of CPU.

    https://www.litespeedtech.com/support/wiki/doku.php/litespeed_wiki:config:mitigating-ddos-attacks#use_max_request_response_settings

    Shorten timeouts for both connection and keep-alive, that should work.

    I would give you perfect config for nginx, but my knowledge about OLS is quite limited. In nginx you can configure how many connections can go to worker and when to terminate old workers/threads & much more finegrain.

    Thanked by 1FlorinMarian
  • tjntjn Member
    edited June 2022

    @AXYZE said:
    I would give you perfect config for nginx...

    I'd be very interested in such a config! :)
    If anything, I've found this thread super interesting and educational.

  • AXYZEAXYZE Member
    edited June 2022

    @tjn said:

    @AXYZE said:
    I would give you perfect config for nginx...

    I'd be very interested in such a config! :)
    If anything, I've found this thread super interesting and educational.

    I would need to create completely different thread in order to explain all of this, because even "perfect config" needs to be customized to website :)

    I will share most important piece - if you block everything but Cloudflare IPs your website will work fine. The problem is that you see traffic only from these Cloudflare IPs and thus you cant rate limit or have extra L7 protection per IP as it will affect both attackers and legit people.

    BUT!
    There's solution for that!
    Cloudflare sends extra headers, we can use "CF-Connecting-IP" header to get real IP of visitors!
    https://github.com/ergin/nginx-cloudflare-real-ip
    That way you can make ratelimiting zones per IP and allow just legit numbers of requests to be passed. You can also drop connections to IP that consistently hit rate limits. It is very powerful against most L7 attacks & completly automated & no falsepositive if you SETUP CORRECTLY (test on legit users and do stupid stuff yourself, make sure you dont hit any rate limits that way)

    It doesn't end there! There's also some other nice headers like "HTTP_CF_IPCOUNTRY" which uses Cloudflare GeoIP. If you have website that serves visitors mainly from one or several countries this if very powerful tool. You can make custom L7 protection that wont have bypass like CF methods of verification, but in the same time whitelist countries of your visitors.

    Ok, one more thing. Microcaching is most underrated feature of nginx. Even if you cache something for like 2seconds it will help A LOT in case of attacks, because if someone is making 2000rq/s you can get answer to them instantly without hitting your database/PHP/whatever.

    These things wont make your server bulletproof, because there's a lot more things to do, but it gets you very close!

    ... one more thing... okay? :) If you serve only one country (lets say you have ecommerce), but you have attacks outside there's one extra way that nobody talks about. You can get two servers and route 100% of one country traffic to first, and then everything else to second. You can do it via Cloudflare Load Balacing (paid, need geobased load balancing extra which will total like $20/mo IIRC) or via Cloudflare Workers (very cheap or free if you dont have many requests per month). This is unusual way, most people just block other countries (not ideal, in case of ecommerce there's people abroad that want to buy something for someone else). This will make sure that your website stays online for 99%+ of your visitors and attackers will stop attack very fast because you are not affected by their attack and they just waste time. :)

  • sotssots Member

    @DP said:

    @sots said:

    @DP said:
    Maybe it would be good to discuss this in private perhaps?

    The last thing you'd want is your enemy(-ies) to know your next move(s).

    Just a thought.

    But maybe we need generic solutions for everyone?

    That can come later, when the issue is resolved :smiley:

    Seems that Racknerd's DDoS protection has protected my server from a DDoS attack yesterday, but while the DDoS protection was active, the server was re-routed from Multacom to Voxility. I found only TCP connection were forwarded and all UDP & ICMP packets were dropped. While my web services survived the attack, all service using UDP such as game server went offline, which is sad. Is there any solutions for protecting UDP service> @DP said:

    @sots said:

    @DP said:
    Maybe it would be good to discuss this in private perhaps?

    The last thing you'd want is your enemy(-ies) to know your next move(s).

    Just a thought.

    But maybe we need generic solutions for everyone?

    That can come later, when the issue is resolved :smiley:

    Okay, I've started a new thread.

  • SpeedTestSpeedTest Member
    edited June 2022

    @AXYZE said: I will share most important piece - if you block everything but Cloudflare IPs your website will work fine. The problem is that you see traffic only from these Cloudflare IPs and thus you cant rate limit or have extra L7 protection per IP as it will affect both attackers and legit people.

    BUT!
    There's solution for that!
    Cloudflare sends extra headers, we can use "CF-Connecting-IP" header to get real IP of visitors!
    https://github.com/ergin/nginx-cloudflare-real-ip

    This should be done regardless of whether there is a DDOS attack, at least for statistics

  • jsgjsg Member, Resident Benchmarker
    edited June 2022

    @Daniel15 said:
    iptables is legacy and you really should be using nftables these days.

    Yes and no. Yes, iptables is legacy but No, as a professional provider one should not use [current linux firewall] but rather two dedicated firewalls, preferably with hardware support.

    @NoComment said:

    @FlorinMarian said: I know for sure that the attack is Layer7 because multiple requests are sent to the site index and then the connection is closed.

    If 8000 requests/sec to just your site index is freezing your server, that is the problem.

    "https everywhere!!!" is what I suspect. If I'm not mistaken @FlorinMarian even said that the attacks (at least many) just establish a connection and then walk away. That's an attack vector we were bound to see and more often, because while relatively expensive and highly likely too hard for most IoT stuff (unless one is a real pro and knows how to forge good enough first packets) it is attractive because surprisingly few requests/packets are enough to take even beefy servers out of the game.

    @FlorinMarian said: I disabled CloudFlare for 24 hours because it was useless.

    The point of external anti-ddos services like cloudflare or anything else is to offload the scrubbing and handling of some known attack vectors to the external service...

    ... which can often be achieved with a smart network adapter too, but alas most people incl. providers just use whatever happens to be in the box.

  • AndrewsAndrews Member
    edited June 2022

    @jsg said:

    @FlorinMarian said: I disabled CloudFlare for 24 hours because it was useless.

    The point of external anti-ddos services like cloudflare or anything else is to offload the scrubbing and handling of some known attack vectors to the external service...

    ... which can often be achieved with a smart network adapter too, but alas most people incl. providers just use whatever happens to be in the box.

    what a monumental BS

    yeah, sure, our Romanian champion who used to build his servers from scraps bought from cociu level sources and other 3rd hand junk (ancient 9 years old CPUs, 6 years old retired HDDs, consumer grade ancient EVO SSDs etc.)... suddenly starts buying some nVidia (ex Mellanox) BlueField-3 DPU cards to implement anti DDOS filtering on them instead of using external widely available el cheapo services (which works very well for others), because his crap (HW specs and lack of config optimization) servers cannot handle 8000rps

    if you want to implement anti DDOS on expensive smart NICs then check their prices first and then confront it with the budget of this "wanna be provider" kid (or maybe it was "when I grow up I want to be a real provider"?)

  • yoursunnyyoursunny Member, IPv6 Advocate

    @Andrews said:

    @jsg said:

    @FlorinMarian said: I disabled CloudFlare for 24 hours because it was useless.

    The point of external anti-ddos services like cloudflare or anything else is to offload the scrubbing and handling of some known attack vectors to the external service...

    ... which can often be achieved with a smart network adapter too, but alas most people incl. providers just use whatever happens to be in the box.

    what a monumental BS

    yeah, sure, our Romanian champion who used to build his servers from scraps bought from cociu and other 3rd hand junk (ancient 9 years old CPUs, 6 years old retired HDDs, consumer grade ancient EVO SSDs etc.)... suddenly starts buying some nVidia (ex Mellanox) BlueField-3 DPU cards to implement anti DDOS filtering on them instead of using external widely available el cheapo services (which works very well for others), because his crap (HW specs and lack of config optimization) servers cannot handle 8000rps

    if you want to implement anti DDOS on expensive smart NICs then check their prices first and then confront it with the budget of this "wanna be provider" kid (or maybe it was "when I grow up I want to be a real provider"?)

    Mellanox 100Gbps is $800/unit, 200Gbps is $1200/unit; if you need optical transceiver, it's extra.
    These can be configured to filter by IP + port, but cannot further recognize protocols.

    BlueField is basically a tiny computer in the NIC, with its own ARMv8 processor and DRAM; I don't know how much they cost.
    It takes more effort to program, but it can do much more.
    You can even do TLS termination and serve static content inside the NIC.
    Suppose you are hit by 1Tbps attack, you can absorb it with ten BlueField adapters.

  • jsgjsg Member, Resident Benchmarker

    @Andrews said:

    @jsg said:

    @FlorinMarian said: I disabled CloudFlare for 24 hours because it was useless.

    The point of external anti-ddos services like cloudflare or anything else is to offload the scrubbing and handling of some known attack vectors to the external service...

    ... which can often be achieved with a smart network adapter too, but alas most people incl. providers just use whatever happens to be in the box.

    what a monumental BS

    I agree with your intro to your comment.

    yeah, sure, our Romanian champion who used to build his servers from scraps bought from cociu level sources and other 3rd hand junk (ancient 9 years old CPUs, 6 years old retired HDDs, consumer grade ancient EVO SSDs etc.)

    Do you have any credible evidence for that? I guess no, but I'm ready to look at any credible evidence you might provide.

    ... suddenly starts buying some nVidia (ex Mellanox) BlueField-3 DPU cards

    There are others too

    to implement anti DDOS filtering on them instead of using external widely available el cheapo services (which works very well for others), because his crap (HW specs and lack of config optimization) servers cannot handle 8000rps

    Totally different things.

    if you want to implement anti DDOS on expensive smart NICs then check their prices first and then confront it with the budget of this "wanna be provider" kid (or maybe it was "when I grow up I want to be a real provider"?)

    One can get some for about $500 which shouldn't be out of reach for most LET providers.

    And yes, it does make sense. For one the bandwidth those adapters can handle is far beyond what the typical LET provider has. But it's of course also helpful to have an extra (and usually more or less specific) hardware/"CPU" to relieve the systems main processor. Third it allows for a reasonable degree of independence from service providers like e.g. CF.

  • @yoursunny said: It takes more effort to program, but it can do much more.

    Yea, programming extremely hard thing to do. But there are a lot of good examples from where to start, like: https://github.com/pavel-odintsov/fastnetmon (i've seen in action such things on many ISP, pretty dope for software)

  • @jsg said:
    Do you have any credible evidence for that? I guess no, but I'm ready to look at any credible evidence you might provide.

    he many times posted announcements about his archeo purchases, so you could check details about his CPUs (i.e. on Intel ARK website there is release date Q3/2013), or look for his photos of hard drives (i.e. manufacture date 2015), or check for yourself what is Samsung 860 EVO SSDs dedicated for

    there you have example of his purchase from last December:
    https://lowendtalk.com/discussion/comment/3334904/#Comment_3334904

    Thanked by 2yoursunny adly
  • yoursunnyyoursunny Member, IPv6 Advocate

    @desperand said:

    @yoursunny said: It takes more effort to program, but it can do much more.

    Yea, programming extremely hard thing to do. But there are a lot of good examples from where to start, like: https://github.com/pavel-odintsov/fastnetmon (i've seen in action such things on many ISP, pretty dope for software)

    FastNetMon appears to be an Intrusion Detection System.
    It's not designed to run on BlueField.

    BlueField can be programmed with Data Plane Development Kit (DPDK).
    I have programmed DPDK, but not on a BlueField.
    It's possible to perform advanced filtering that understands protocol semantics, including TLS termination and filtering by URI.

    Thanked by 2desperand bulbasaur
  • AndrewsAndrews Member
    edited June 2022

    @yoursunny said:
    BlueField is basically a tiny computer in the NIC, with its own ARMv8 processor and DRAM; I don't know how much they cost.
    It takes more effort to program, but it can do much more.
    You can even do TLS termination and serve static content inside the NIC.
    Suppose you are hit by 1Tbps attack, you can absorb it with ten BlueField adapters.

    @yoursunny do you really think, than he has servers with 10 PCI-e x16 slots, able to accommodate ten DPU cards (each costing thousands of dollars)? and 1Tbps uplink able to send all this traffic to his server? I don't think so :D
    or looking how he is dealing with this current DDOS mess, do you think that programming these DPU would be easier for him?

    point is, that is it much more effective to filter this DDOS traffic as much as possible at external services (i.e. such CF has network connectivity millions times better then single provider can imagine) instead of building such monstrous (10 DPUs) machines with beefy uplinks in your own (especially from el cheapo Romanian boy's perspective)

    DPUs are great products, but they are dedicated for hyperscalers, not wanna be el cheapo starters... they would never earn for themselves in $14/y LET boxes

  • yoursunnyyoursunny Member, IPv6 Advocate

    @Andrews said:

    @yoursunny said:
    BlueField is basically a tiny computer in the NIC, with its own ARMv8 processor and DRAM; I don't know how much they cost.
    It takes more effort to program, but it can do much more.
    You can even do TLS termination and serve static content inside the NIC.
    Suppose you are hit by 1Tbps attack, you can absorb it with ten BlueField adapters.

    @yoursunny do you really think, than he has servers with 10 PCI-e x16 slots, able to accommodate ten DPU cards (each costing thousands of dollars)? and 1Tbps uplink able to send all this traffic to his server? I don't think so :D
    or looking how he is dealing with this current DDOS mess, do you think that programming these DPU would be easier for him?

    point is, that is it much more effective to filter this DDOS traffic as much as possible at external services (i.e. such CF has network connectivity millions times better then single provider can imagine) instead of building such monstrous (10 DPUs) machines with beefy uplinks in your own (especially from el cheapo Romanian boy's perspective)

    DPUs are great products, but they are dedicated for hyperscalers, not wanna be el cheapo starters... they would never earn for themselves in $14/y LET boxes

    I can't find a server with 10 PCIe x16 slots.

    EPYC 7003 series processor has 128 lanes, but there's no motherboard with 8 x16 slots.
    The maximum I found among single EPYC configuration is 5 x16 slots and 2 x8 slots, because some lanes have to be reserved for NVMe, USB, etc.

    Dual Xeon configuration can have 8 x16 slots, but they are behind 4 PCI switches.
    Having PCI switches reduce available bandwidth.
    I also heard complaints that they cause multiple NICs to be placed into the same IOMMU group, which causes problem with PCI passthrough via SR-IOV.

    Buy 1Tbps Ethernet adapters and give each VPS dedicated 25Gbps port.
    The Romanian boy will instantly become the best provider.

    Thanked by 1bulbasaur
  • HxxxHxxx Member

    Ok so you disabled CF...
    and are not testing any other antiDDoS.

    This is not the way.

    I believe you would have solved this by just buying a VPS with IP's filtered (probably that uses path net) move your site there, make the A record changes, done.

    Other option was to get a new IP assigned to the server. Setup Cloudflare paid version, make sure your origin don't leak, and that should improve your situation.

  • @yoursunny said:
    Buy 1Tbps Ethernet adapters and give each VPS dedicated 25Gbps port.

    imagine you just bought such 25Gbps VPS (for Romanian price)
    for such high net spec it would be an involuntary reflex (at least for me) to run yabs. right?
    and boom... you triggered super duper hiper Romanian anti evil protection... and you win 364 days on involuntary idling I mean service termination :D

    The Romanian boy will instantly become the best provider.

    fully agree :D

    Thanked by 2yoursunny bulbasaur
  • yoursunnyyoursunny Member, IPv6 Advocate

    @Andrews said:

    @yoursunny said:
    Buy 1Tbps Ethernet adapters and give each VPS dedicated 25Gbps port.

    imagine you just bought such 25Gbps VPS (for Romanian price)
    for such high net spec it would be an involuntary reflex (at least for me) to run yabs. right?
    and boom... you triggered super duper hiper Romanian anti evil protection... and you win 364 days on involuntary idling I mean service termination :D

    The SmartNIC can recognize and respond to iperf3 traffic locally.
    You'll see 25Gbps without using Internet egress.

    Thanked by 1bulbasaur
  • GhtGht Member
    edited June 2022

    I saw that to many Providers here offered him to help , but he is ignoring all of them for some reason , and he showed that he is not capable to deal with ddos attacks so i think that he messed with someone that he should not do that, And thats the reason why he is being a target of ddos. Dude dont make enemies but make money and accept helps from other providers. I know a lot providers here that can stop L7 Attacks easy.

  • stefemanstefeman Member
    edited June 2022

    @Ght said:
    I saw that to many Providers here offered him to help , but he is ignoring all of them for some reason , and he showed that he is not capable to deal with ddos attacks so i think that he messed with someone that he should not do that, And thats the reason why he is being a target of ddos. Dude dont make enemies but make money and accept helps from other providers. I know a lot providers here that can stop L7 Attacks easy.

    The issue is, that his backend is all public, so even if he fixed it by handing all keys and passwords to a competent helper on these forums, (which by the way is absolutely the most retarded idea ever, if you are a commercial provider with your own customers) the attacker could still just nuke his real IPs and bypass the Cloudflare protection.

    Originally this guy became provider as a student project, so its fine to be incompetent, but if he specializes in anti-ddos as he claimed before, i've seen more competent discord based kid hosts with 14yo admins.

  • DPDP Administrator, The Domain Guy
    hazi.ro.                5       IN      NS      dns1.path.net.
    hazi.ro.                5       IN      NS      dns2.path.net.
    

  • jsgjsg Member, Resident Benchmarker

    @Andrews said:

    @jsg said:
    Do you have any credible evidence for that? I guess no, but I'm ready to look at any credible evidence you might provide.

    he many times posted announcements about his archeo purchases, so you could check details about his CPUs (i.e. on Intel ARK website there is release date Q3/2013), or look for his photos of hard drives (i.e. manufacture date 2015), or check for yourself what is Samsung 860 EVO SSDs dedicated for

    there you have example of his purchase from last December:
    (image)

    So?

    You want a cheap VPS - you'll end up with old processors. You want modern processors - no problem, but you'll pay significantly more. What's the problem in your eyes?

    @Andrews said:

    @yoursunny said:
    BlueField is basically a tiny computer in the NIC, with its own ARMv8 processor and DRAM; I don't know how much they cost.
    It takes more effort to program, but it can do much more.
    You can even do TLS termination and serve static content inside the NIC.
    Suppose you are hit by 1Tbps attack, you can absorb it with ten BlueField adapters.

    @yoursunny do you really think, than he has servers with 10 PCI-e x16 slots, able to accommodate ten DPU cards (each costing thousands of dollars)? and 1Tbps uplink able to send all this traffic to his server? I don't think so :D
    or looking how he is dealing with this current DDOS mess, do you think that programming these DPU would be easier for him?

    point is, that is it much more effective to filter this DDOS traffic as much as possible at external services (i.e. such CF has network connectivity millions times better then single provider can imagine) instead of building such monstrous (10 DPUs) machines with beefy uplinks in your own (especially from el cheapo Romanian boy's perspective)

    DPUs are great products, but they are dedicated for hyperscalers, not wanna be el cheapo starters... they would never earn for themselves in $14/y LET boxes

    Why 10 x16 PCIe slots when the total bandwith a provider has isn't even near 1 Tb/s? Here on LET we're more talking like n x 10 Gb or maybe, just maybe a few 100 Gb/s, plus the adapter @yoursunny mentioned isn't the only one, there are also quite some 2x25, 2x40, and up to 2x200 Gb/s adapters available, some of which even have a firewall built in; no real programming needed. Granted, those don't terminate TLS (but they usually do AES) but then that's an entirely different story anyway.

    TL;DR for what providers like @FlorinMarian (and many others here) need there are adapters in the $500 price range available and those adapters, used as a firewall, can take a ton of load from the servers.

  • edited June 2022

    @Hxxx said:
    I believe you would have solved this by just buying a VPS with IP's filtered (probably that uses path net) move your site there, make the A record changes, done.

    What he said

  • NoCommentNoComment Member
    edited June 2022

    @jsg said: TL;DR for what providers like @FlorinMarian (and many others here) need there are adapters in the $500 price range available and those adapters, used as a firewall, can take a ton of load from the servers.

    That's not true because he is colocating servers 1-2U at a time and he has 1 Tbps voxility anti-ddos so I'm guessing it comes as part of the colocation package or some kind of addon service. The networking is probably handled by the datacenter anyway for these 1-2U colocations.

    Maybe when he is colocating an entire rack, it would make sense to consider scrubbing himself but at that point, why even bother with these adapters? In fact, with just one rack, maybe you would still be better off relying on someone else within the datacenter...

    @stefeman said: but if he specializes in anti-ddos as he claimed before

    I hope you're kidding

  • LTGTLTGT Member

    i mean, now he is on path and it's still dead.

  • sandozsandoz Veteran

    Hazi.ro when I enter your website is shows a document to be downloaded through mobile... What a hell.. Both https or http asks to download a file....

    Thanked by 1Blazingfast_IO
  • jsgjsg Member, Resident Benchmarker
    edited June 2022

    @NoComment said:

    @jsg said: TL;DR for what providers like @FlorinMarian (and many others here) need there are adapters in the $500 price range available and those adapters, used as a firewall, can take a ton of load from the servers.

    That's not true because he is colocating servers 1-2U at a time and he has 1 Tbps voxility anti-ddos so I'm guessing it comes as part of the colocation package or some kind of addon service. The networking is probably handled by the datacenter anyway for these 1-2U colocations.

    As if "[some] Anti-DDOS 1 Tb/s" meant that a provider really has a 1 Tb/s pipe ...

    I think we both know that extremely few providers here at LET have that kind of bandwidth but hey, if e.g. Voxility has a 1 Tb/s connectivity in the DC (or even just via a MAN linking multiple DCs) even a provider with a single 10 Gb/s line can - and more often than not will - talk about "1 TB/s" protection.

    Maybe when he is colocating an entire rack, it would make sense to consider scrubbing himself but at that point, why even bother with these adapters?

    I already answered that. It can make sense with pretty much any bandwidth.

  • @jsg said:

    @NoComment said:

    @jsg said: TL;DR for what providers like @FlorinMarian (and many others here) need there are adapters in the $500 price range available and those adapters, used as a firewall, can take a ton of load from the servers.

    That's not true because he is colocating servers 1-2U at a time and he has 1 Tbps voxility anti-ddos so I'm guessing it comes as part of the colocation package or some kind of addon service. The networking is probably handled by the datacenter anyway for these 1-2U colocations.

    As if "[some] Anti-DDOS 1 Tb/s" meant that a provider really has a 1 Tb/s pipe ...

    I think we both know that extremely few providers here at LET have that kind of bandwidth but hey, if e.g. Voxility has a 1 Tb/s connectivity in the DC (or even just via a MAN linking multiple DCs) even a provider with a single 10 Gb/s line can - and more often than not will - talk about "1 TB/s" protection.

    The point was never the number, but anyway the 1 Tb/s probably would only last a few minutes/seconds anyway. If there was a 1 Tb/s attack that lasts 1 minute and they can filter it to 10 Gb/s of clean traffic, then that will work just fine.

    My point is that at 1-2U colocation, everything networking related is already being dealt with for you.

    @jsg said:

    Maybe when he is colocating an entire rack, it would make sense to consider scrubbing himself but at that point, why even bother with these adapters?

    I already answered that. It can make sense with pretty much any bandwidth.

    Are you suggesting installing one adapter per server? Don't forget that most of his hardware is second-hand and an additional $500 could mean another 6 mths to recover costs. When you do have an entire rack, what are you gonna do with these adapters? Install some adapters on a server and some network cards to connect to the whole rack?

  • @NoComment said:

    @jsg said: TL;DR for what providers like @FlorinMarian (and many others here) need there are adapters in the $500 price range available and those adapters, used as a firewall, can take a ton of load from the servers.

    That's not true because he is colocating servers 1-2U at a time and he has 1 Tbps voxility anti-ddos so I'm guessing it comes as part of the colocation package or some kind of addon service. The networking is probably handled by the datacenter anyway for these 1-2U colocations.

    Maybe when he is colocating an entire rack, it would make sense to consider scrubbing himself but at that point, why even bother with these adapters? In fact, with just one rack, maybe you would still be better off relying on someone else within the datacenter...

    @stefeman said: but if he specializes in anti-ddos as he claimed before

    I hope you're kidding

    I am not. Literally go check his introduction thread and his first sales thread where he tells about it and his goals.

  • ZigiZigi Member, Host Rep

    @LTGT said:
    i mean, now he is on path and it's still dead.

    We made additional adjustments for him. Everything looks good now.

This discussion has been closed.