
Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[tlug] DDB/CJKV-E Web Host under DDOS attack
- Date: Sat, 2 Jan 2016 13:48:08 +0900
- From: Charles Muller <acmuller@example.com>
- Subject: [tlug] DDB/CJKV-E Web Host under DDOS attack
- References: <55E425B2.3010309@l.u-tokyo.ac.jp> <5684F956.6080103@l.u-tokyo.ac.jp>
- User-agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
Dear Colleagues,
For more than a week, our web hosting service, Linode, has seen its
servers worldwide fall under a sustained dDos attack that has continued
to cripple its business (see note from Linode below). As a result, the
DDB and CJKVE dictionaries have also been shut down periodically. We are
presently working on alternative solutions as we follow the situation.
If you happen to experience difficulties in accessing the dictionaries
in the coming days, please understand that we are aware of the
situation, and will do our best to maintain our service.
Regards,
Chuck
===============================================
An update from Linode about the recent DDoS attacks
I’d like to share some updates about the recent DDoS attacks.
I am one of several network engineers at Linode. All of us have been
working around the clock on DDoS mitigation. While things are stable, I
would like to take a moment to publicly address the large and frequent
DDoS attacks that we have been receiving since Christmas Day.
It has become evident in the past two days that a bad actor is
purchasing large amounts of botnet capacity in an attempt to
significantly damage Linode’s business. The following is a partial list
of attacks we have received in no particular order:
- Multiple volumetric attacks simultaneously directed toward all of our
authoritative nameservers, causing DNS hosting outages
- Multiple volumetric attacks simultaneously directed toward all of our
public-facing websites, causing Linode Manager outages
- Layer 7 (“400 bad request”) attacks toward our web and application
servers, causing Linode Manager outages
- Large volumetric attacks toward our colocation provider’s upstream
interconnection points, overwhelming the router control planes and
causing significant congestion/packet loss
- Large volumetric attacks toward Linode network infrastructure,
overwhelming the router control planes and causing significant
congestion/packet loss
All of these attacks have occurred multiple times. Over the course of
the last week, we have seen over 30 attacks of significant duration and
impact. As we have found ways to mitigate these attacks, the vectors
used inevitably change.
As of this afternoon, we have mostly hardened ourselves against the
above attack vectors, but we expect more to come. We are working
extremely closely with all of our technical partners, including our
network equipment vendors and our colocation providers, to prevent
future attacks.
Once these attacks stop, we plan to share a complete technical
explanation about what has been happening. Additionally, we will be
announcing the details of an ongoing project to significantly improve
our internet connectivity and resiliency.
We would like to apologize for the lack of detail in some of our recent
status-page updates. Please know that we are dedicating all resources
from multiple departments to stopping these attacks. We acknowledge the
amount of downtime we’ve been experiencing is completely unacceptable,
and we appreciate the understanding and support we have received over
the past several days. We will share more information as our
investigation continues.
Alex Forster
Network Engineer at Linode
Posted on Dec 31, 22:23 UTC
--
---------------------------
A. Charles Muller
Graduate School of Humanities and Sociology
Faculty of Letters
University of Tokyo
7-3-1 Hongō, Bunkyō-ku
Tokyo 113-8654, Japan
Office Phone: 03-5841-3735
Web Site: Resources for East Asian Language and Thought
http://www.acmuller.net
Twitter: @H_Buddhism
Home |
Main Index |
Thread Index