Strange that they cannot send a BGP blackhole upstream to keep everyone
else online within their advertised route.
On 8/3/16 5:27 PM, Tony Wicks wrote:
Further to that, and I would suggest it should be part of the overall
discussion here. It appears the IPv4 IP block my VM is in is not currently
advertised on the world route table. I assume hostus.us's transit provider has
dropped their ipv4 BGP to save themselves. This is really the ultimate reward
for the extortionists as they don't even need to sustain the DDOS to attack
their target. While I see the transit providers point of view, it’s a pretty
shitty situation for their customer, and their customers/customers.
-----Original Message-----
From: NANOG [mailto:[email protected]] On Behalf Of Tony Wicks
Sent: Thursday, 4 August 2016 9:10 AM
To: 'NANOG list' <[email protected]>
Subject: RE: Host.us DDOS attack
Interestingly my VM (LA) with them has been effectively down for half a day as
far as IPv4 is concerned. IPv6 traffic seems unaffected.