nanog mailing list archives

Re: Host.us DDOS attack


From: Jason Canady <jason () unlimitednet us>
Date: Wed, 3 Aug 2016 17:31:27 -0400

Strange that they cannot send a BGP blackhole upstream to keep everyone else online within their advertised route.

On 8/3/16 5:27 PM, Tony Wicks wrote:
Further to that, and I would suggest it should be part of the overall discussion here. It appears the IPv4 IP block my VM is in 
is not currently advertised on the world route table. I assume hostus.us's transit provider has dropped their ipv4 BGP to 
save themselves. This is really the ultimate reward for the extortionists as they don't even need to sustain the DDOS to 
attack their target. While I see the transit providers point of view, it’s a pretty shitty situation for their customer, and 
their customers/customers.



-----Original Message-----
From: NANOG [mailto:nanog-bounces () nanog org] On Behalf Of Tony Wicks
Sent: Thursday, 4 August 2016 9:10 AM
To: 'NANOG list' <nanog () nanog org>
Subject: RE: Host.us DDOS attack

Interestingly my VM (LA) with them has been effectively down for half a day as far as IPv4 is concerned. IPv6 traffic 
seems unaffected.








Current thread: