Can anyone recommend neutral facilities in both the UK and Australia?
Rob
Can anyone recommend neutral facilities in both the UK and Australia?
Rob
Rob,
i'd give a look at www.peeringdb.com as a start. I suspect that a
lot of it may depend upon your application and power needs... I'm
thinking of personal experiences with DC power needs and space that
required the housing of dwdm equipment etc, vs. someone who needs
servers, etc...
I'm sure there will be no shortage of folks chiming in... I also hear
some folks are using ireland instead of the London area, as well as
Manchester, etc... Have you considered other nearby countries as
well? The dutch and germans do a good job and there are some nice
sites in madrid, but to each his own/ ymmv! good luck
Peter Cohen
UL is seeing a large DDOS coming towards a couple of customers of ours.
I know that other ISPs have been affected as well. I will let them
identify them selves.
Anyone have any scoop on this?
Tim
A) I don't think anyone knows who UL is by that reference alone (I assume
you mean united layer).
B) The DoS target is Livejournal.
C) As an upstream of an upstream of LJ I'm barely seeing 150Mbps or so of
it. No indications of exactly how big it is by the time it hits them,
but at least from my perspective it doesn't seem like a huge attack.
Hope it stops soon though, a sustained livejournal outage is probably
grounds for at least 4-5 suicides by distraught teenagers who can't blog
about their day.
Richard A Steenbergen wrote:
Add in the Blue Security DDOS. NSP-SEC must be busy defending DDoS'ers tonight
keeping them from helping people defend LiveJournal.
Uh. Who let the Frog out?
http://www.wired.com/news/technology/internet/0,70798-0.html?tw=rss.technology
Martin Hannigan wrote:
> UL is seeing a large DDOS coming towards a couple of customers of ours.
> I know that other ISPs have been affected as well. I will let them
> identify them selves.
>
> Anyone have any scoop on this?A) I don't think anyone knows who UL is by that reference alone (I assume
you mean united layer).B) The DoS target is Livejournal.
C) As an upstream of an upstream of LJ I'm barely seeing 150Mbps or so of
it. No indications of exactly how big it is by the time it hits them,
but at least from my perspective it doesn't seem like a huge attack.Hope it stops soon though, a sustained livejournal outage is probably
grounds for at least 4-5 suicides by distraught teenagers who can't blog
about their day.Add in the Blue Security DDOS. NSP-SEC must be busy defending DDoS'ers
tonight
keeping them from helping people defend LiveJournal.Uh. Who let the Frog out?
http://www.wired.com/news/technology/internet/0,70798-0.html?tw=rss.technology
Blue Security's solution to their DOS was to point their www to their
Typepad-hosted blog.
apogee:/home/pedro> host www.bluesecurity.com
www.bluesecurity.com is a nickname for bluesecurity.blogs.com
bluesecurity.blogs.com has address 204.9.178.61
apogee:/home/pedro> whois -h whois.arin.net 204.9.178.61
OrgName: SIX APART LTD
OrgID: SAL-48
[...]
How's that for honorable comportment. We're getting slammed so we're
gonna make it someone else's problem(and not give them a heads up).
Like Lycos MLNS, I predict we'll see random infrastructure obfuscation,
route changes, hardware moves, etc. and ultimately the end of BS. If
not today, perhaps soon.
It's interesting to watch the equivalent of the battle of
Omaha Beach between two sets of miscreants, one legitimized by
some on nsp-sec, and one legitimized by a commercial DDoS service.
-M<
And this just hit wires with quotes from Renesys and SANS ISC.
http://www.infoworld.com/article/06/05/04/78074_HNbluesecurityddos_1.html
-M<
I hate to be the bearer of bad news to spammers but based on
bluesecurity's tactics I can make a guess about attitude of their
people and its such that DoS attack on them will only cause them
more determination to continue and I suspect to majority of their users as well (and publicity is also likely to bring them more users).
Moving the site to TypePad was incorrect way of dealing with attack
though; but its actually not the first time I've heard of the site
using a blog as temporary page while their primary site is down due
to DoS... - some education on what blogs are good for is in order.
But as it is looks like bluesecurity is moving to prolexic which
claim to deal with just such situations.
I hate to be the bearer of bad news to BS' VC's, but BS moving their
DNS to UltraDNS and hosting to Prolexic was likely not part of the business
plan. "They ain't cheap". The spammers can now theoretically force them
to spend all time and all their money responding to attacks.
The killer here is that they asked a lot of people a year ago whether this
was a good idea and everyone said no. Read John Levine's blog and pointer to a
few of his previous articles. He wasn't the only person they asked. There's a
WHOLE lot more to this than is public.
Spammers: 2 Blue Security: 0
NANOG: -2 (vigilante time sink)
-M<
Agreed.
It's just the latest in the series of fiascos that we've seen when
people try to respond to abuse with abuse. It doesn't work, it's
not going to work, and the most likely outcome of any attempt to
make it work will be yet another illustration of the law of
unintended consequences. (e.g. Lycos' "MakeLoveNotSPam")
Not to mention that furnishing useful intelligence to the enemy
(which BS does by design) is a poor strategy.
---Rsk
I hate to be the bearer of bad news to spammers
but based on
bluesecurity's tactics I can make a guess about attitude of their
people and its such that DoS attack on them will only cause them
more determination to continue and I suspect to majority of their users as well (and publicity is also likely to bring them more users).Moving the site to TypePad was incorrect way of dealing with attack
though; but its actually not the first time I've heard of the site
using a blog as temporary page while their primary site is down due
to DoS... - some education on what blogs are good for is in order.
But as it is looks like bluesecurity is moving to prolexic which
claim to deal with just such situations.I hate to be the bearer of bad news to BS' VC's, but BS moving their
DNS to UltraDNS and hosting to Prolexic was likely not part of the business
plan. "They ain't cheap". The spammers can now theoretically force them
to spend all time and all their money responding to attacks.
You know quite well that if they continue dos for too long law-enforcement
would finally get interested... Now I really don't know UDNS and Prolexic
prices but I have a feeling those hosting fees would be far from being
their biggest expense. So I have to disagree with you that is what could
bring them down, though I agree that as usual a lot depends on if their
VCs want all this going - I just don't think hosting fees will be major
reason for such a decision (unless BS self-funded which I doubt).
The killer here is that they asked a lot of people a year ago whether this was a good idea and everyone said no.
Yep and they were all right.
Spammers: 2 Blue Security: 0
NANOG: -2 (vigilante time sink)
Its more like:
Spammers: -2 Blue Security: -1 Nanog: 0 (talk is cheap but results are...)