Are your garden variety DDoS mitigation platforms or services equipped to handle DDoSes of VoIP services? What nuances does one have to be cognizant of? A WAF doesn’t mean much to SIP, IAX2, RTP, etc.
Unlike http based services which can be placed behind cloudflare or similar, harder to protect sip trunking servers.
The provider in question makes use of third party hosting services for each of their cities’ POPs. It is my understanding that for the most part they do not run their own infrastructure but either rent dedicated servers or a few rack units of Colo in each city.
I question whether some or any of those hosting companies have sufficient inbound (200-400Gbps) capacity to weather a moderately sized DDoS.
I’m going to be reaching out to both of the organizations you listed, but I don’t see any of their documentation mentioning SIP, RTP, or any of the “normal” VOIP protocols or use cases.
Fail2Ban on a couple of dozen servers may not be sufficient to address 400 gigs of traffic.
Also, also… keep in mind that ‘fail2ban’ does some processing on the log messages to which it MAY take action.
It’s taking, essentially, untrusted external input and … acting as ‘root’.
that sounds like a recipe for a disaster, to me… is the code utf-8 safe? are the actions it takes safe in the context of whatever PTR record content may come down the pipe? or apache(equivalent) log message parsing?
For those persons with voip.ms accounts, the DDoS-protected servers are in their control panel with a green checkmark next to them as recommended servers.
Now it looks like part of the DDoS has shifted to bandwidth.com.