These forums have been archived and are now read-only.

The new forums are live and can be found at https://forums.eveonline.com/

EVE General Discussion

 
  • Topic is locked indefinitely.
 

Server Issues - Feb 28, 2014

First post First post
Author
Vipre Morte
Team JK
#201 - 2014-03-03 05:24:21 UTC
Alanna Northstar wrote:


DDoS has a very solid solution. Ingress/Egress filtering.


This is for attacks that employ IP source address filtering. Most modern DDoS methods employ amplification attacks, such as DNS or newer NTP amplification attacks from non-spoofed botnet IP addresses. This is an overload of data from "legitimate" sources, utilizing legitimate network protocols.
Linna Baresi
#202 - 2014-03-03 11:20:02 UTC
I'm still having issues. Sockets closing unexpectedly, screen freezing when I try to view character info, 'stuttering' when jumping gates, sometimes slight rubberbanding. And all this even in low-traffic systems.

I usually log in through IPredator (VPN, Swedish IP), since that improves the stability of my connection for some reason. The past week, it doesn't really matter whether I use my static Dutch IP or the flexible IPredator one.

Member of since 2003 fated.europefreeforum.com

Arwen Varekai
Viziam
Amarr Empire
#203 - 2014-03-03 15:34:27 UTC
Dallas, Texas. Have been down since the DDOS. I get to the black screen of boredom is my best so far. The icons on the left load up and now and then I do get a faded pop up when I try to access anything; but that's after it sits at the black screen for 2 hours.

Definitely seems like IPs have been block in broad ranges.


Who wants my stuff? Shocked lol
LunarGlow
Patriarch Of Destruction
Solyaris Chtonium
#204 - 2014-03-03 17:05:28 UTC
There's been a patch and i can login now.

However...

I do not appreciate the fact that there has been NO COMMUNICATION for the last 2 days from CCP and that they just toss us a patch and hope this all goes away.
Prie Mary
Science and Trade Institute
Caldari State
#205 - 2014-03-03 17:35:35 UTC
more disconnects currently

Dont just [u]think[/u] outside the box, [u]Live[/u] outside of it...

Prie Mary
Science and Trade Institute
Caldari State
#206 - 2014-03-03 17:44:25 UTC
and again....

Dont just [u]think[/u] outside the box, [u]Live[/u] outside of it...

KIller Wabbit
MEME Thoughts
#207 - 2014-03-03 23:30:07 UTC
Are red tags just like Star Trek red shirts - no respect, prepare to die? Come on already - make them "jump to" just like blue (shirts) tags.
EightiethRaptor
Sector.8
#208 - 2014-03-04 00:23:36 UTC
anyone still getting socket errors, i still cant seem to log in even with the patch that was given out today.
Kahawa Oban
New Groton Industrial Works
#209 - 2014-03-04 01:21:09 UTC
I'm good to go. I was having problems this weekend. With the patch all good. Big smile
EightiethRaptor
Sector.8
#210 - 2014-03-04 01:24:34 UTC
http://imgur.com/iOMZlvu
looks like i wasnt so lucky lol
Vipre Morte
Team JK
#211 - 2014-03-04 01:26:27 UTC
No issues in the hour that today's patch was applied for me. So far, so good.
Vipre Morte
Team JK
#212 - 2014-03-04 01:56:31 UTC
Vipre Morte wrote:
No issues in the hour that today's patch was applied for me. So far, so good.

Haha, scratch that. Just got the socket close error. =(
Chrome Weasel
Pator Tech School
Minmatar Republic
#213 - 2014-03-04 02:22:04 UTC
Vipre Morte wrote:
Vipre Morte wrote:
No issues in the hour that today's patch was applied for me. So far, so good.

Haha, scratch that. Just got the socket close error. =(


Same here. Started disconnecting a lot, gave up playing.
Haansu Mikairu
Echelon Research
Goonswarm Federation
#214 - 2014-03-06 05:32:04 UTC
Krixtal Icefluxor wrote:
From convos with other players, this does seem to be exclusive to US Midwest. (3 people from Michigan, one from Minnesota.)


It is not exclusive to certain parts of the world if they are DDoS'ing the main server IP-address. When that happens and if the server + service(s) is still up and running, a limited amount of players will be able to logon while others will be dropped, etc.
Haansu Mikairu
Echelon Research
Goonswarm Federation
#215 - 2014-03-06 05:34:46 UTC
jin ko82 wrote:
also hurry the **** up....you would expect a company that is going to build a monument to this game to have better security


Protecting against some types of DDoS is easy, other kinds are "not so easy" to protect against. Even with "Anti-DDoS" protection. If the attack however is always coming from the same location(s), any connection attempts from these should be null-routed (into nothing) before they even hit the server or any firewalls as the routers in front can generally handle a lot more traffic.
Haansu Mikairu
Echelon Research
Goonswarm Federation
#216 - 2014-03-06 05:44:47 UTC
Andski wrote:
Haansu Mikairu wrote:
Most DDoS attacks comprise of SYN Floods.


SYN floods are intended to overload the network stack of the targeted host, not saturate its bandwidth. Most providers mitigate those these days so they're not even used anymore. These days it's usually bruteforce UDP floods from botnets or CC frauded servers, and some of the nastier ones are, as you said, reflected from poorly configured public DNS resolvers and NTP servers.


I think you need to read Prolexic's Q4 report. SYN floods still happen.

Here are the round numbers from it: (Network Layer attacks)
3% ACK
6% CHARGEN (Big amplification attack. Look for the chargen map on twitter.)
1% FIN PUSH
10% DNS
10% ICMP
1% RESET
0.5% RP
15% SYN
0.5% SYN PUSH
0.25% TCP Fragment
13% UDP Floods
17% UDP Fragment

And the application layer attacks are as follows:
20% HTTP GET
0.5% HEAD
0.25% NTP (Despite this hit a target with over 400Gbps)
0.25% SSL POST
1% PUSH
2% HTTP POST

SYN Floods are still very effective and can still take down targets such as EVE and possibly even your home router exposed to the Internet with no ports open. (I was exposed to a DDoS once when I confronted a few black hats, and despite I had no ports open to the Internet, I lost all Internet connectivity for a few hours until they stopped.)

When I mentioned SYN Floods it was meant in conjunction with a botnet. A SYN Flood from a single computer will rarely do any harm to modern computer systems.
Haansu Mikairu
Echelon Research
Goonswarm Federation
#217 - 2014-03-06 05:47:05 UTC
LunarGlow wrote:
This australian is picking fun at the people who can't play a game they paid for. He would be singing a different tune if he was on the other side of the fence.


Look, I was in Australia when the DDoS occurred and CCP tweeted about it and I saw almost everyone drop from the server including myself right before the scheduled downtime. Since that day I have not had any problems logging on.
Haansu Mikairu
Echelon Research
Goonswarm Federation
#218 - 2014-03-06 05:50:13 UTC
Vipre Morte wrote:
Alanna Northstar wrote:


DDoS has a very solid solution. Ingress/Egress filtering.


This is for attacks that employ IP source address filtering. Most modern DDoS methods employ amplification attacks, such as DNS or newer NTP amplification attacks from non-spoofed botnet IP addresses. This is an overload of data from "legitimate" sources, utilizing legitimate network protocols.


Finally someone speaking the same language as me Big smile
TKL HUN
Jugis Modo Utopia
#219 - 2014-03-06 10:41:09 UTC
Is anyone out there aware that today I already had "socket closed" 2 times? Someone?

I can't even undock and start to kill someone because I don't know when the sockets will be closed again...

Just asking if anyone is taking care about this issue because I can't see no "official" posts about this here on the forums.
Bael Malefic
Doomheim
#220 - 2014-03-06 11:48:27 UTC
Been getting DC'd, socket closed, a lot. Yesterday just as I was undocking - and when I finally got back on, there's my ship, sitting in space off the undock. In null. Not happy, CCP.

But I digress. Last two patches (today and the last one) both failed for me. Ran repair tool. Repair tool failed as well.

Grrr CCP. Grrr DDOSers. Just grrr.