DDOS attacks are real, and Blizzard isn't doing anything about it

Because they can not take any action about it.

Educate yourself how networking works, before making any accusations.

Multiplayer on consoles runs over the servers from the console companies, not the companies developing the games, which is also why crossplay is such a huge deal and needs the approval of the console companies to work, while it would be a no-brainer if the game developers simply could use their own servers on any platform.

So if anyone could do something about it, it would be Microsoft, in the case of X-Box.

And if they really could do a DDOS attack simply by knowing the IP of the player, which could be possible if XBox-Live uses peer-to-peer connections (I do not know if this is the case), it is also the responsibility of the player to protect his own network from DDOS attacks. And if it is possible to start DDOS attacks directly through XBOX-Live, which would be hard to detect and block on the client side, it is also Microsofts responsibility to fix it.

In any case Blizzard has nothing to do with anything that happens on XBox-Live.

Usually it’s responsibility of ISP to keep their clients safe. Especially since enough of those clients have zero clue on how network works, and all hardware is installed by ISP technicians.

Basically everyone chooses self install because it is cheaper, and if you keep your router at default settings your are basically asking for someone to hack you. There are lists for default authentications to a lot of routers ISP tend do give their customers.

And if you want something useful you buy your own router anyway

Still, ISP has to keep internet hackers out. Can’t do anything about local ones, that decide to hack your Wi-Fi.

The ISP can not keep hackers out, the ISP is like the road, and saying the ISP has to keep hackers out is like saying whoever built the road is responsible for the accidents you make on it.

Typically ISP does provide some protection, and can provide extra for additional payment. Companies, that are too small to afford their own IT department and anti-DDoS defenses, pay ISP to do it for them.

Which typically only companies do. And most of the things they provide for private customers are not worth the money anyway.

ISPs provide protections for additional services they have, like hosting a website. They do not (besides very basic stuff) provide protections for services you host on your own, behind the ISPs access point. They can not protect from a malware that resides on your side and they also can not provide any protection from you getting the malware without deep packet inspection, which we obviously do not want for privacy reasons.

That’s not something a home user can do. No matter what you do, you can’t stop or prevent 1k+ infected botnet computers flooding your home IP with so much data that it uses all all your bandwith. Some of the largest web sites in world like PayPal have been taken offline from this type of attack.

Glad to see not everyone is white knights in armor to defend blizzard . Is incredible how many people still defends everything this company do

It’s actually called dos’ing in this case. Just fyi…

1 Like

Think you really overestimate botnet powers available for such “pranks”.

Well, what do you want them to do? If it’s actual DoS on player’s IP, Blizzard has nothing to do with it.

But I have doubts, that it was DoS, as OP didn’t mention lags - DoS doesn’t cause immediate disconnect.

And you exactly described why DDOS should usually not work. The ultimate solution against a Denial of SERVICE attack is to shut down said service. If nothing answers the request DoS does not work anymore.

Typically a home user does not have a service running and it does not matter how many requests you send if there is nothing to process and/or answer these requests.

And if you as a home user have a service running that might make you susceptible to DoS attacks, it its your responsibility to configure it a way to defeat against DoS or shut it down. And every router even for home use has ways to protect against DDoS attacks.

You could be running a Cisco Catalyst 8000 router and still get your bandwith swamped with so much data that you can’t use the Internet.

Not sure you understand that someone with 100mbit or even 1GB download can have that entire pipe saturated with far more data than it can handle. This is the most common DDoS attack.

When Paypal was taken offline, the botnet was just making calls to their website because overloading the HTTP servers is easier than consuming up all their bandwith. Home users don’t have that much bandwith so just flooding the IP with crap data can kill the connection.

1 Like

Yes, wonder why big sites like google can get DDOS’ed, probably cuz bad protection right?

1 Like

No because they want to present a service to the public, and it is not trivial to distinguish between traffic rightfully trying to use the service and crap.

But it is very trivial to do this if you do not present a service to the public, the rule then simply becomes ignore any incoming traffic.

Big sites get DDoS, because it’s entirely different level of botnet.

Like, there is difference between some amateur level botnet with 500 infected PCs, and pro level, that has near 1 million PCs all spamming some site from different countries.

Which, surprise, includes all things you download. If you want to continue using internet, you’ll need more sophisticated protection.

It’s goal of DDoS attack - to make certain site/PC disconnect from network or become unable to provide whatever services it offers. In case of sites, even 1 hour of Paypal or Google being in offline can cost millions of $.

Which is why things you download are technically not inbound packets, at least the usual things you download.

Everything you download does not come actively from outside, but your client asks from the inside the service for data, and it sends also how/where it expects the answer. Then the service sends back data to you how and where it is told to.
And that is the only thing the firewall lets through because technically it is not an incoming packet but instead an answer to an outgoing packet from your side.
You could technically use this for DoS, but only if you are a man in the middle and can intercept the outgoing packet beforehand. Only then you can know how you have to send your packet for it to go through the firewall, it is not possible just randomly knowing the target IP address.

This is also the default configuration for pretty much any firewall, let everything go out but block everything incoming. And if you configure your firewall this way it downloads will still work, because these are initiated from the inside of the network and therefore these packets are not treated as incoming packets.

That exact “defense” is why DDoS works - router can only analyse so much incoming data, before getting overwhelmed.

This topic is clearly getting annoying has the attacks are increasing in the past 2 months. Any featured player gets disconnected usually in the middle to the end of the round. Checking my firewall logs I could note an increase on the packets around the time my match got disconnected. Is Blizzard doing something to prevent this???

Then why is this issue only on xbox? :thinking::thinking::thinking:
I think you answered your own problem.

1 Like