A DDoS...really?

my point exactly.

all the people attempting to call me out don’t understand the layers of DNS blackholes, ACLs, Global & Local load balancing, and cloud networking through software defined networking and the layers of firewalls in between all of those systems. Nor do they understand Cloud Security Personnel actually do their job and ISPs have significant DDoS preventation.

They don’t understand the public IPs for the game hosted services are just industrial NAT on a firewall redirecting into a decentralized data center that can dynamically allocate resources, spread loading across landing zones in the cloud infrastructure.

A bunch of CCNA “i work in IT” wizards in here. As i stated earlier, the issue was more than likely a patch or an internal intrusion. Internal intrusions are pretty much the only way you’re going to DDoS a system in the cloud with as much visibility as the D4 game.

1 Like

Yup. I just used the word “stopped” becuase they did and I was trying to speak using their terms. But that is correct, they are mitigated and not stopped because that would require breaking the law.

You’re adorable. Go do some reading.

1 Like

Lol bunch of forum dwellers with zero plans on a sunday during the summer.

Touch grass probably the best way to figure out the DDoS issue

You honestly expect this company to have any form of competency? Lmfao

i dont expect game developers to know anything about network security; so, no i don’t expect competency from them.

goblins think it cost too much resources and cut into their bonuses. venture co don’t to invest into that kind of innovation!

So you are saying they launched an online game without understanding the basis of network security? Lmfao even better

As much as I wanted to agree Blizzard handled this badly, AWS is actually a tech company so it’s acceptable that they dealt with DDoS better. Still, Blizzard didn’t do a good job.

Yeah, is there a shortage of staff across departments in Blizzard? They don’t seem to get themselves together and react fast enough on genuine problems.

As I’ve said elsewhere, it’s not a Blizzard game unless it’s DDoSed at least once.

sometimes it makes me think that all these ddos attack are just blizz excuses and paying those attacker from otherside of the world(so they can perform quick maintenance and cull the anger but make more anger in exchange). we had this sht in wrath, cata, panda land even early draenor got that flying mount stuck at the stronghold, etc.

I’m mean…puting an vulnerable system in a vulnerable position is 100% on blizzard’s cybersecurity and cloud architecture team.

Reacting to the attack is 100% on the cloud provider and isp.

It’s Blizzard, and sadly it’s common and they still haven’t learned.

DDOS attacks are difficult to handle unless it’s some script kiddie using a darkweb rented bot net to spam illegit requests at the server which was probably the case here.

If I had to guess it was the authentication server specifically that was being mauled.

1 Like

it’s hard to have a grasp on exploitation.

I don’t imagine game develoeprs being heavily entrenched in hacktivism or black hatting.

oh my godness … Cloudflare is about website … not videogames :man_facepalming:
Whoever throw “CDN” within a game environment simply don’t know what he’s talking about.

As someone that work at a large European web-hosting company I can guarantee you that whoever want your online service down will succeed, given he have enough resources. This is just a fact.

No it’s not always the case, it only depend on whatever contract is signed with your cloud provider, given that you use any. Anyone can simply just rent a room in a datacenter, setup its own private cloud and plug himself on the datacenter.
The datacenter will provide electricity and bandwidth. It is also not responsible for any kind of DDoS protection and don’t even use firewall. Their job is to provide bandwith, not to tackle excessive bandwidth issue.
If the DDoS is large enough, you can simply saturate that bandwidth and have only one option: disconnect affected enpoint to avoid the DDoS to affect other services hosted on the same datacenter and using the same physical routes.

DDOS attacks still happen because they are still effective at causing companies problems, at their core their abusing the fact that the internet is there to transport data, and their data. the cloud flare incident that’s is being mentioned was google interposing its network and throttling the attack traffic, they got it before it could ramp up, interposed, throttled instead of deny, and managed to mitigate the attacks impact ont he servers, however that process would have still cuase issues for some users, just not the majority of them. Such stuff is also expensive, as someone is now tying up part of a network and the support to interpose, filter, and then passing good traffic.

No im not a network engineer, im not a systems security person, none of that, but a couple of things, you can flood traffic, and force either steps to be taken, that then still have some impact on end users, even if its just extra latency and delay, and force the company to pay to mitigate the attack, or if they have their own means divert resources to it, or they aren’t going to be able to mitigate it either fully, or at all, and their going to go down. Either way you are causing the company problems and costing them money, which is the point of a DDOS, its to cuase the company its targeted at a problem.

and why do they still happen, because they work at the task of causing the company a problem, the reason, it could be cover for a hack, it could be a script kiddie renting bot nbet time, it could be hackers, who knows, but it cuases the company issues, so they get used. the core principle is simple, even if the attack types change from junk data to pings, to bad server call requests, to what have you to try and get around various protections aginst it. As the defenses evolve, so has the exact method of ddos, and so has the sheer volume of data thats getting thrown around.

You can ask what defenses blizzard has, why they dont have more, or do more, or any number of other things sure, but understand, ddos still happens becuase it still works at its core, and that core is it cuases the company problems.

as a extra that AWS amazon attack, the compnay i worked for had switched to AWS for phones and such, that attack even with amazon working on it took us out, spotty when it was working, and just down alot, love getting paid for sitting in a chair, but thats money amazon was loosing.

:troll: /10 thread.

OP, is next level clueless.

:popcorn:

2 Likes

Blizzard isnt in the business of DDoS mitigation. Why are people crapping on them like they should somehow be an industry standard for mitigation of this kind of attack? Just because something is possible to do ( mitigation) doesnt mean everyone can or should do it. Todays outage does not warrant the cost it would have incurred to prevent it. Not even close.

Actually, you should if you know how to do it. “Can” really depend of the scale (how much it affect, how long it last) and the type (high bandwidth consumption, high connection count, what part of the whole platform is affected).