Blue wrote on Aug 25, 2014, 10:58:Ah, thanks.Ant wrote on Aug 25, 2014, 10:46:
Did BN ever get DDoSed?
Well, yes and no. We were not the targets (AFAIK), but we were victims of one of the original DOS attacks on the Internet when the site was still on Panix.com, as Panix suffered a massive attack in late 1996 that prompted us to move to our own domain. Panix was apparently targeted due to their activism on behalf of the EFF.
Found an article on it. According to Cisco, this was *the* original denial of service:The first DoS attack occurred against Panix, the New York City area's oldest and largest Internet Service Provider (ISP), on September 6, 1996, at about 5:30 p.m. [14]. The attack was against different computers on the provider's network, including mail, news, and Web servers, user "login" machines, and name servers. The Panix attack was a SYN Flood attack deriving from random IP addresses and directed toward server Simple Mail Transfer Protocol (SMTP) ports. More specifically, Panix's computers were flooded by, on average, 150 SYN packets per second (50 per host), so Panix could not respond to legitimate requests [15]. Because the attackers used spoofed source IP addresses intraffic their packets, the addresses could not be traced and malicious could not be filtered. For that reason the attack was not immediately confronted. The solution was to use a special structure, instead of full Transmission Control Block (TCB), to hold half-open connections until the last ACK packet was received. In that way, the listen queue was large enough to keep all the SYN requests before the half-open connection timed out. The timeout, on the other hand, was adjusted to 94 seconds [16]. However, although Panix overcame this attack, the new threat (DoS attacks) made administrators worry.
Ant wrote on Aug 25, 2014, 10:46:
Did BN ever get DDoSed?
The first DoS attack occurred against Panix, the New York City area's oldest and largest Internet Service Provider (ISP), on September 6, 1996, at about 5:30 p.m. [14]. The attack was against different computers on the provider's network, including mail, news, and Web servers, user "login" machines, and name servers. The Panix attack was a SYN Flood attack deriving from random IP addresses and directed toward server Simple Mail Transfer Protocol (SMTP) ports. More specifically, Panix's computers were flooded by, on average, 150 SYN packets per second (50 per host), so Panix could not respond to legitimate requests [15]. Because the attackers used spoofed source IP addresses intraffic their packets, the addresses could not be traced and malicious could not be filtered. For that reason the attack was not immediately confronted. The solution was to use a special structure, instead of full Transmission Control Block (TCB), to hold half-open connections until the last ACK packet was received. In that way, the listen queue was large enough to keep all the SYN requests before the half-open connection timed out. The timeout, on the other hand, was adjusted to 94 seconds [16]. However, although Panix overcame this attack, the new threat (DoS attacks) made administrators worry.
Task wrote on Aug 22, 2014, 17:05:
If anything republicans/fundamentalists should be sent to fight with IS, not hackers.
Iurand wrote on Aug 22, 2014, 16:10:
What if it's ISIS scum?
NKD wrote on Aug 22, 2014, 18:12:Creston wrote on Aug 22, 2014, 17:36:
And why would you target things like LoL or GW2, two games made by companies who are extremely player-friendly, and who follow a laudible business model?
They aren't targeting the company. They are targeting the players. These guys basically thrive on the attention they get from "bringing down your favorite game."
When Wildstar and some other games were being DDOS'd a few weeks ago, the guy who was doing it was bragging and acting like a fucktard on some stolen Twitter account.
Tjold wrote on Aug 22, 2014, 17:20:
Who the fuck goes around packeting MMOs?
And, like, why?
Tjold wrote on Aug 22, 2014, 17:20:
Who the fuck goes around packeting MMOs?
And, like, why?
Tjold wrote on Aug 22, 2014, 17:20:
Who the fuck goes around packeting MMOs?
And, like, why?
Creston wrote on Aug 22, 2014, 17:36:
And why would you target things like LoL or GW2, two games made by companies who are extremely player-friendly, and who follow a laudible business model?