lordrichter wrote: »lordrichter wrote: »lordrichter wrote: »lordrichter wrote: »Amazon does not host ESO
Genuinely curious - do you have a source for this?
Has ZOS come out and said it? No.
they dont say alot of things, thats just one of their major problems.
They should tell us who provides and runs their data center?
i dont care who runs what for them, theyve been aware for awhile that they lack the measures to defend themselves. this isnt the first time nor the last. you sound like you could help them,here ya go:
Bah. They can't afford me.
Caligamy_ESO wrote: »Whoever out there is responsible for it better be laying REAL low, this is a company that has no qualms about suing even giant corporations. Others have been sued and jailed over this very thing over the past 7-8 years.
How does DDoS affect broken grouping system? Enlighten me, I'm not good at these networking things. Lag is one thing, but modern MMOs have got grouping working 100%.
ZOS_GinaBruno wrote: »While we do have protection in place (which we obviously can’t discuss publicly), it hasn’t been enough. We’ve been working hard to implement additional security measures to make sure you’re able to log in – and stay logged in – whenever you want to play, and aren’t interrupted. We hope you understand why we’re being somewhat vague and not discussing specifics here. We take this issue very seriously, though, and are working hard to ensure everyone has the best experience possible.
Thank you for your continued support and patience.
NeoXanthus wrote: »DDoS is nothing new and should have been planned for from the beginning. There are many ways to mitigate the attacks. One approach is to use an on-data center appliance solution like Radware or Arbor with an additional cloud based volumetric service like Prolexic Akamai or Verisign DDoS mitigation services. These solutions are not cheap but are necessary in our day.
lordrichter wrote: »NeoXanthus wrote: »DDoS is nothing new and should have been planned for from the beginning. There are many ways to mitigate the attacks. One approach is to use an on-data center appliance solution like Radware or Arbor with an additional cloud based volumetric service like Prolexic Akamai or Verisign DDoS mitigation services. These solutions are not cheap but are necessary in our day.
Honestly, they have been dealing with DDoS for quite a while. Gina's statement suggests that this most recent attack has bypassed existing DDoS mitigation. Given what we have actually seen in their response, it certainly looks that way.
NeoXanthus wrote: »lordrichter wrote: »NeoXanthus wrote: »DDoS is nothing new and should have been planned for from the beginning. There are many ways to mitigate the attacks. One approach is to use an on-data center appliance solution like Radware or Arbor with an additional cloud based volumetric service like Prolexic Akamai or Verisign DDoS mitigation services. These solutions are not cheap but are necessary in our day.
Honestly, they have been dealing with DDoS for quite a while. Gina's statement suggests that this most recent attack has bypassed existing DDoS mitigation. Given what we have actually seen in their response, it certainly looks that way.
I assume Zenimax has something in place for SYN attacks (within the pipe size), Slowloris, and other attacks that and on premises device can defend against. The problem is when the attack is bigger than your internet pipes. A solution like Prolexic or Verisign cloud based solution uses GRE tunnels to divert good traffic back to your edge routers with a better matched eBGP announced prefix. For example, you announce a 23-bit to your internet edge and a Cloud based DDoS mitigation solution announces 2x 24-bit routes within your 23bit ARIN range. Because they have a better matched advertisement to the eBGP world traffic will flow to them and is scrubbed and returned to you over GRE tunnels. Most good Cloud based DDoS mitigation solutions have an unfathomable amount of traffic in the multi-terabit range so it is not possible for them to be hit with volumetric attack that cannot be filtered. These services are not free in fact they are very expensive but very needed.
NeoXanthus wrote: »lordrichter wrote: »NeoXanthus wrote: »DDoS is nothing new and should have been planned for from the beginning. There are many ways to mitigate the attacks. One approach is to use an on-data center appliance solution like Radware or Arbor with an additional cloud based volumetric service like Prolexic Akamai or Verisign DDoS mitigation services. These solutions are not cheap but are necessary in our day.
Honestly, they have been dealing with DDoS for quite a while. Gina's statement suggests that this most recent attack has bypassed existing DDoS mitigation. Given what we have actually seen in their response, it certainly looks that way.
I assume Zenimax has something in place for SYN attacks (within the pipe size), Slowloris, and other attacks that and on premises device can defend against. The problem is when the attack is bigger than your internet pipes. A solution like Prolexic or Verisign cloud based solution uses GRE tunnels to divert good traffic back to your edge routers with a better matched eBGP announced prefix. For example, you announce a 23-bit to your internet edge and a Cloud based DDoS mitigation solution announces 2x 24-bit routes within your 23bit ARIN range. Because they have a better matched advertisement to the eBGP world traffic will flow to them and is scrubbed and returned to you over GRE tunnels. Most good Cloud based DDoS mitigation solutions have an unfathomable amount of traffic in the multi-terabit range so it is not possible for them to be hit with volumetric attack that cannot be filtered. These services are not free in fact they are very expensive but very needed.
sounds like they should allocate some of that lawsuit money into this,wont happen though. finance wont approve it since IT isnt a revenue generating dept of the company.
The Elder Scrolls Online’s Servers Are Struggling Due to DDoS Attacks
During the past few days The Elder Scrolls Online players have been reporting issues with server instability. The issues appear to have ramped up during the past 48 hours, causing discussion on social media and forums.
According to developer ZeniMax Online Studios this has been caused by a series of DDoS attacks. The news was confirmed by admin Gina Bruno, who shared the following:We’d like to briefly explain what’s been going on with the North American server stability lately. In short, we’ve been getting hit with many repeated DDoS attacks (Distributed Denial of Service). When this happens, it floods our service and prevents you from being able to log in, stay connected, or even group properly. Sometimes they only affect a handful of players, and other times they can cause a much greater and widespread impact. Either way, it’s a frustrating situation.
While we do have protection in place (which we obviously can’t discuss publicly), it hasn’t been enough. We’ve been working hard to implement additional security measures to make sure you’re able to log in – and stay logged in – whenever you want to play, and aren’t interrupted. We hope you understand why we’re being somewhat vague and not discussing specifics here. We take this issue very seriously, though, and are working hard to ensure everyone has the best experience possible.
Thank you for your continued support and patience.
The attack has arrived in the middle of a major PvP event for the game called Midyear Mayhem. Many players have reported losing progress during participation, summoning frustration among the playerbase.
It is unclear when the DDoS will subside, but ZeniMax has historically been effective in thwarting attacks.
These attacks are among many in 2017. Earlier in the year DDoS was a huge concern of Ubisoft when it launched For Honor, and we've seen seen mega companies such as Blizzard and Square Enix affected on a routine basis.
Mine seems back to normal at the moment. Funny how the pvp event ended not long before. How are others connection?