Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


VMPort - NJ1 Service Outage.
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

VMPort - NJ1 Service Outage.

Ash_HawkridgeAsh_Hawkridge Member
edited February 2012 in General

I would like to take the time to announce an ongoing service outage on our KVM node NJ1.

We have received a rather disturbing email from our New Jersey provider regarding removing our server from the network due to over 10 plus 4Gbit+ attacks outbound and inbound on the node over the last 48 hours. All i can say at this time is that we are disgusted at how the said provider is dealing with this situation, as you may or may not know the KVM side of our business is new as is our relationship with this company...

They are not prepared to give us an ETA at this time.

What i will say is that our pingdom monitoring has showed no sign's of connection issues of which they speak nor have we received any complaints from clients, which is giving me cause for concern. http://stats.pingdom.com/0hb9pb5bu6h3

A 1Gbit port would be easily saturated by attacks this large which would, to the best of my knowledge, show as a "Service Disruption" in pingdom.

We will keep all clients updated within our network blog.

I would like to apologize for any inconvenience this ongoing issue is causing.

All other OpenVZ/Xen VPS and Shared hosting account's are online as normal.

Regards,
Ash @ VMPort

«13

Comments

  • What provider are you with for NJ?

  • @Jeffrey

    I'm not going to mention any names just yet since we go through an individual that may use these forums.

  • JacobJacob Member
    edited February 2012

    I don't blame them personally, To block a attack like that you would need Multiple 10 Gbit uplinks and $1000's in DDOS Protection equipment.

    If it is affecting the network, Then obviously your going to get dropped.

  • FranciscoFrancisco Top Host, Host Rep, Veteran

    How were you able to send a 4Gbit flood on a 1Gbit port? o_O

    Francisco

  • Ash_HawkridgeAsh_Hawkridge Member
    edited February 2012

    @Francisco

    Im assuming that was regarding an inbound attack, they didn't give me any numbers for outbound. The message was vague to say the least.

    My wording is a bit misleading, i have just been woken up by this :P

    Ash

  • FranciscoFrancisco Top Host, Host Rep, Veteran

    Still brutal for sure :(

    Do they not have any sort of auto nullroutes?

    Francisco

  • Apparently not, would you agree with my comment regarding pingdom picking up these attacks that have supposedly been going on for 48 hours?

    Tbh we are just use to our system at Equinix. Email > An incoming DDoS attack has been picked up on xx.xx.xxx, click to blackhole this IP.

    Not just "Your server has been unplugged for an unspecified amount of time"

    Ash

  • So they can't null route the IP that was being attacked and they took the whole server offline? If there was really a 4Gbit+ attack going on for 48+ hours, you would have known. I say run from whoever you have that server with.

  • @VMPort, that thread you made of the new site template you were making had a crappy template and it looks terribad. However, what you have now is smaller and thus looks hella' coo.

  • @VMPort did you colocate with them? If so, run to their datacenter and grad your dedi/dedis and go somewhere else. :) Possibly BurstNET?

  • Maybe another provider here can talk to their DC and hook you up for a quick move somewhere better.

  • why did I not get an email, and why do I not see an announcement on your site? that should be the first thing you do, not come here and post about how it's your provider's fault. I JUST moved my git repos over to your KVM... would really like it if I can get that back lol

  • Cool, but... I don't understand why you don't monitor your nodes :S or why you didn't noticed.

  • @yomero said: Cool, but... I don't understand why you don't monitor your nodes :S or why you didn't noticed.

    Did you not read all of his post? Read it again.

    Thanked by 1DeletedUser
  • @DotVPS said: So your saying if you monitor the node you could of blocked the attack?

    Where it says that?

    No

  • May be is obvious, but nowhere in the posts say something about something like "noticed the issue, then notified the provider" or "powered off the server" or "my monitor system triggered some alarms".

    Don't try to look for something between the words.

  • Yes, that monitors uptime, doesn't monitor bandwidth, i/o, load, etc. That kind of monitoring system.

  • @DotVPS said: i/o, load wouldn't really show much...

    Again, I am not saying that.

    Nevermind... /out

    @VMport I hope you solve your issues with that datacenter.

    Thanked by 1DeletedUser
  • FranciscoFrancisco Top Host, Host Rep, Veteran

    @DotVPS said: But if it was incoming...

    i/o, load wouldn't really show much...

    the DC im guessing as most of them using ubersmith now he could see bandwidth incoming increased.

    Packetloss would be shown.

    Francisco

  • Looks like its back up. Looks like my VM was rebooted, is that standard for network outages?

  • @kbar said: Looks like its back up. Looks like my VM was rebooted, is that standard for network outages?

    They already stated that their server was shut off. So it have to boot up.

  • @kbar said: Looks like its back up. Looks like my VM was rebooted, is that standard for network outages?

    no, but if the host suspended the server for the ddos attacks by unplugging it yes.

  • @kbar

    We did send out an email straight away, as well as a post in our network blog (http://network.vmport.com), do you have accurate contact details on file?

    @yomero

    Yes we have munin and pingdom monitoring, but there not much use when the server is unplugged :)

  • prometeusprometeus Member, Host Rep

    Why the entire server was uplugged? Did they send you the target IPs of the attack? Was the main ip of the server part of the attack?
    Do you have remote KVM (keyboard) access to the server? Or can your colocator provide such out of band access so you can still be on server to work togheter with the network engineers to mitigate/solve the issue?

  • @prometeus

    That's kind of what i was getting at, its not on. No they didn't send any info just basically said "Its unplugged, deal with the issue when its back online"

    Yes we have KVM access but its no good when the server is completely unplugged.

  • prometeusprometeus Member, Host Rep

    This is really unusual afaik... you really unplug things as a last resort when you dont know what else to do...

  • vedranvedran Veteran
    edited February 2012

    It took them 48 hours to detect 4Gbit incoming attack, and then they had no better idea than shutting down the whole node? Couldn't they just unplug the network cable instead? >_<

  • @vedran

    Dont ask, im quite frankly not prepared to believe that over 10 attacks went on over 48 hours without us or our clients noticing.

    The server was certainly shut down and not just unplugged though.

    12:34:22 up 3:39, 1 user, load average: 0.48, 0.44, 0.37

    Thanked by 1DeletedUser
  • if it was really 4 gbps it would be forced to drop 3 out of every 4 packtets so it would defiantly be noticeable.

  • @DotVPS said: Isn't freevps.us on there KVM service?

    It was, but I was testing how well it ran on my $26/yr SecureDragon Xen VPS when it went down.

Sign In or Register to comment.