|
|
|
||||
|
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() |
|
|||||||
| Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
|
Thread Tools |
|
|
#1 |
|
Confirmed User
Join Date: Mar 2003
Posts: 275
|
Silvercash updates
Any news?
|
|
|
|
|
|
#2 |
|
Too lazy to set a custom title
Join Date: Oct 2002
Location: Global Traveler
Posts: 51,271
|
No.
|
|
|
|
|
|
#3 |
|
Confirmed User
Industry Role:
Join Date: Jan 2001
Location: FL
Posts: 6,632
|
Getting pretty sad. 3+ days of constant downtimes.
|
|
|
|
|
|
#4 |
|
Confirmed User
Industry Role:
Join Date: Oct 2002
Location: lalaland
Posts: 2,120
|
Could be really hard to fight of a big DDOS attack.
|
|
|
|
|
|
#5 |
|
Confirmed User
Join Date: Mar 2003
Posts: 275
|
Who are they being attacked by and why?
|
|
|
|
|
|
#6 |
|
ICQ: 175171926
Join Date: Oct 2002
Location: New York, NY
Posts: 11,046
|
I have switched all my traffic to another sponsor, no time for this.
When they are back up for a while i will consider them again.
__________________
HEY!! Unbeatable hosting! Customer service is top notch! --> ISPrime <-- Do a search on any board, their reputation is rock solid .. for years!! |
|
|
|
|
|
#7 |
|
Will everyone please review my newest site?
Join Date: May 2002
Posts: 841
|
Fuck they are down again. Seems like they can't fight the DOS attacks.
I redirected my traffic to another sponsor.
__________________
|
|
|
|
|
|
#8 |
|
Confirmed User
Join Date: Mar 2003
Posts: 275
|
I'd like to stick it out with them. It would be a major pain in the ass to switch but some info would be nice.
|
|
|
|
|
|
#9 |
|
Confirmed User
Join Date: Aug 2001
Location: P
Posts: 101
|
LA Mike posted on the Silver board earlier today, they were attacked from hundreds of servers to their secure joinforms. They have bought and installed new firewalls yesterday.
It was up and running 7-8 hours ago, but it seems like they are attacked again today....... |
|
|
|
|
|
#10 |
|
The Best Ideas Start Here
Join Date: Dec 2002
Location: Atlanta
Posts: 6,037
|
I can tell you from my experience in the hosting business that these attacks are very difficult to defend. I wish them the best of luck.
__________________
Regards, Rick Latona http://latonas.com Latona's - We Sell Money Making Web Properties Note to buyers of websites and traffic: please check our inventory at http://latonas.com/websites-for-sale. If you would like to make an offer on something, just let me know. |
|
|
|
|
|
#11 |
|
OU812
Join Date: Feb 2001
Location: California
Posts: 12,651
|
what the heck is going on all these attacks, GFY, AWI, SpamCop, SilverCash, and some in Europe. AWI is still down
__________________
Epic CashEpic Cash works for me Solar Cash Paysite Plugin Gallery of the day freesites,POTD,Gallery generator with free hosting |
|
|
|
|
|
#12 | |
|
Confirmed User
Join Date: Jan 2002
Posts: 2,025
|
Quote:
![]()
__________________
LiveBucks / Privatefeeds - Giving you money since 1999 Up to 50% Commission! 25% Webmaster Referal Powered by Gamma |
|
|
|
|
|
|
#13 |
|
Confirmed User
Join Date: Aug 2002
Location: Alicante, Spain
Posts: 382
|
SpamCop's down.
Hmmmmm. where did I put that 8 million emails cd I bought for $19.99. ![]()
__________________
http://www.sdm-soluciones.com/design/ |
|
|
|
|
|
#14 | |
|
OU812
Join Date: Feb 2001
Location: California
Posts: 12,651
|
Quote:
__________________
Epic CashEpic Cash works for me Solar Cash Paysite Plugin Gallery of the day freesites,POTD,Gallery generator with free hosting |
|
|
|
|
|
|
#15 | |
|
OU812
Join Date: Feb 2001
Location: California
Posts: 12,651
|
Quote:
http://www.silvercash.com/affiliate/members/home/ The page cannot be displayed The page you are looking for is currently unavailable. The Web site might be experiencing technical difficulties, or you may need to adjust your browser settings.
__________________
Epic CashEpic Cash works for me Solar Cash Paysite Plugin Gallery of the day freesites,POTD,Gallery generator with free hosting |
|
|
|
|
|
|
#16 | |
|
Confirmed User
Join Date: Aug 2002
Location: Alicante, Spain
Posts: 382
|
Quote:
__________________
http://www.sdm-soluciones.com/design/ |
|
|
|
|
|
|
#17 |
|
Confirmed User
Industry Role:
Join Date: Oct 2002
Location: lalaland
Posts: 2,120
|
works now
edit: very slow though :].
__________________
|
|
|
|
|
|
#18 |
|
Confirmed User
Join Date: Jan 2001
Location: el lay, ca usa
Posts: 2,540
|
still down for me
|
|
|
|
|
|
#19 |
|
Confirmed User
Industry Role:
Join Date: Jul 2001
Location: Orange County, CA
Posts: 3,056
|
We are continually working on it guys. I dont know what else to say but sorry. We havent slept in days and we have put up some of the best firewalls and routers and continue to battle.
I will keep you updated. |
|
|
|
|
|
#20 |
|
Confirmed User
Join Date: Nov 2002
Location: Father's office
Posts: 207
|
Perhaps this is the beginning of the DOS Hacker Olympics they keep talking about?
Good luck with this Mike...have you guys thought about dumping some of the domains onto a CDN for a bit? Might be able to deflect some of the load for a while and/or tell you more about the origin of the attack...sorry if that's repetitive info... hope you guys are up soon... |
|
|
|
|
|
#21 | |
|
Let's do some business together
Join Date: Dec 2001
Posts: 973
|
Quote:
|
|
|
|
|
|
|
#22 |
|
Confirmed User
Join Date: Oct 2001
Location: KB's trailer
Posts: 7,840
|
Best of luck Mike. Back in the day, we had constant attacks from the password community, taking shit down left and right. There is no easy answer. Our silvercash links are still up as always, this is just a slight bump in the road.
__________________
Sig too big http://www.gofuckyourself.com/gfy_faqs.html Want to use a large banner in your sig??? Contact Eric about getting on as an advertiser - eric AT adult.com |
|
|
|
|
|
#23 | |
|
Push Porn Like Weight.
Industry Role:
Join Date: Mar 2002
Location: Inside .NET
Posts: 10,652
|
Quote:
__________________
Cry havoc and let slip the dogs of war. |
|
|
|
|
|
|
#24 | |
|
Confirmed User
Join Date: Jun 2002
Location: Seattle
Posts: 1,062
|
Quote:
That's been my experience in the past at least. |
|
|
|
|
|
|
#25 |
|
Registered User
Industry Role:
Join Date: Sep 2002
Posts: 75
|
We are staying with you Mike.
Silvercash has been an honest and lucrative partner of ours for years, and it would take more than a little down time to get us to move anything anywhere else. Johnny V. |
|
|
|
|
|
#26 |
|
Ryde or Die
Industry Role:
Join Date: Dec 2002
Location: California-Shanghai
Posts: 19,568
|
hey Mike is your upstream provider helping at all?
|
|
|
|
|
|
#27 |
|
Confirmed User
Join Date: Apr 2002
Posts: 173
|
Mike, are all of your paysites going down along with silvercash.com? I have PPC traffic I'm sending, and I'ma have to stop the campaigns if so.
__________________
Do you need SERIOUS SEO done for competitive keywords? See if one of my three plans will fit your needs today! You may qualify for my TOP10 Guarantee! Skype me @ mrclean78 |
|
|
|
|
|
#28 |
|
Confirmed User
Join Date: Apr 2002
Posts: 173
|
Nevermind, I answered my own question. I just checked and of the paysites are down as well....not good bro.
__________________
Do you need SERIOUS SEO done for competitive keywords? See if one of my three plans will fit your needs today! You may qualify for my TOP10 Guarantee! Skype me @ mrclean78 |
|
|
|
|
|
#29 |
|
Confirmed User
Join Date: Feb 2002
Location: Free Speech Land
Posts: 9,484
|
Here is another thread about this issue, for those that haven't read it:
http://www.gofuckyourself.com/showth...hreadid=149406 Also, we plan to stick with Silvercash through the problems. Good luck guys. |
|
|
|
|
|
#30 |
|
Confirmed User
Industry Role:
Join Date: Jul 2001
Location: Orange County, CA
Posts: 3,056
|
Things should be normal soon... Keeping my fingers crosses. Some stuff going on that I think is going to end this thing soon.
Stay tuned |
|
|
|
|
|
#31 | |
|
Pounding Googlebot
Industry Role:
Join Date: Aug 2002
Location: Canada
Posts: 34,487
|
Quote:
WG
__________________
I play with Google. |
|
|
|
|
|
|
#32 |
|
Confirmed User
Join Date: May 2002
Location: Oslo, Norway
Posts: 748
|
I know this may be inappropaite to ask, but can some of the guys here with experience protecting their programs outline some BASIC "must have" protection against these kind of attacks together with a price tag?
This sounds very scary and I hope Silvercash can resolve this issue as soon as possible. |
|
|
|
|
|
#33 | |
|
Confirmed User
Join Date: Jan 2002
Posts: 971
|
Quote:
|
|
|
|
|
|
|
#34 |
|
Confirmed User
Join Date: Aug 2001
Location: P
Posts: 101
|
It has been running nicely for a couple of hours from europe.
The servers are very fast right now :-) |
|
|
|
|
|
#35 |
|
Confirmed User
Join Date: Jan 2001
Location: SVK
Posts: 406
|
only couple of hours. Down again.
XM |
|
|
|
|
|
#36 |
|
Confirmed User
Join Date: Jan 2002
Posts: 971
|
do you know from what servers the attacks come from? why not take them down? should not be a problem. i normally fight back with 1000hits/sec but sometimes i have to turn up to 10k. if you are afraid of legal actions against you just publish a list of host where the attacks are coming from - i am sure many pissed affiliates will fight back.
|
|
|
|
|
|
#37 |
|
Confirmed User
Join Date: Mar 2002
Posts: 502
|
yeah, taking down thousands of computers, that makes sense
|
|
|
|
|
|
#38 | |
|
Confirmed User
Join Date: Jul 2001
Location: The Netherlands
Posts: 2,239
|
Quote:
It's very hard to stop them. A firewall doesn't help too much. You need to block them before they come that far. What I've heard is that a good traffic filter is the best solution. There are some companies that are specialized in making systems to detect and stop heavy ddos attacks. They cost alot but will be worth it for things like this. Your host should know about this or call a security expert. |
|
|
|
|
|
|
#39 |
|
Confirmed User
Join Date: Feb 2002
Location: Amsterdam
Posts: 9,377
|
What SC is facing is known as a DDoS which means a Distributed
Denial of Service Attack. Anyone who thinks this is simple script kiddies work is wrong. I will try to outline in a simple way how a DDoS works and why it is so hard to stop it. First of all the attacker needs to hack 100's or 1000's of servers in many different networks. Usually he picks servers that are connected to large amounts of bandwidth. On each of the machines he installs a server kind of program that listens to commands from 1 central place and can launch any type of attack on command. This can be simple webhits, or large packet streams using multiple protocols, like ICMP, UDP or TCP/IP. For best effect the attacker uses huge amounts of tiny packets as this causes the maximum load possible on routers and servers. Especially Cisco routers are known to have difficulties with HUGE amounts of small non TCP packets. TCP/IP requires a handshake protocol for communication whereas ICMP and UDP don't. So most likely UDP or ICMP packet protocols are being used. Once the attacker has a huge amount of these server type scripts installed he can trigger all the nodes with 1 central script which will launch his attack simultaniously over all nodes. Since there are so many nodes it's next to impossible to start blocking traffic with a firewall. The nodes are all in different networks and use 10.000's of different IP's so it's virtually impossible to start blocking IP's simply because there are too many. By blocking full C-classes you will end up blocking half the internet so that's no option either. Using access-list filters on core routers is a bad idea because it would create such a load that the routers will run out of memory within seconds. Core routers switch gigabytes of traffic per second so filtering it there is very bad idea. The router should read each packet and compare it to a ruleset to see if it can be forwarded or dropped. The attack can be simple webpage hits, so it's very hard to determine which packets are fraudulant and which not. With a huge number of servers you can flood almost any server quite easily. The best way to handle DDoS attacks is with your upstream provider. Look at the traffic and write down from which core networks the attacks are coming. Call those carriers and give them the IP nets from which the attacks are coming. They can either stop advertising those IP networks or contact RIPE/ARIN/SARIN to take action. The solution in stopping the attack is not so much technical. Understanding what's going on and determing where it comes from and then getting up to the carrier that controls those IP nets is where you can do something. Mike I have a lot of experience with this stuff. I'm sure you have really good people around you. In case you can use extra help feel free to hit me up. As I tried to explain determing source nets is the key to your problem. DynaMite UIN# 370820
__________________
| http://www.sinnerscash.com/ | ICQ: 370820 | Skype: SinnersCash | AdultWhosWho | |
|
|
|
|
|
#40 |
|
Registered User
Join Date: Jul 2003
Location: Rocklin, CA
Posts: 14
|
The attacks can vary, you can't have complete protection against this type of attack.
Distributed denial of service attacks, are very powerful, and much more widespread these days, because windows computers can now participate in them, which wasn't always the case. Windows now has 'raw sockets' support which makes IP spoofing possible, so if a 2,000 windows botnet is all pumping garbage packets to a single server with fake source IPs, you pretty much are out of options for tracing, the only way of tracing is by tracking a single stream of data to the router they are coming from, 1 hop at a time, which is virtually impossible to get that kind of cooperation with every hop unless your the FBI. The attack a while back that went against ebay and yahoo was the same type of attack, using a unix variant, called trinoo, which is the same type of attack, except required rooted unix boxes to orcestrate since unix has had raw socket support forever, though required less servers because unix servers tend to be well connected. The tools available to create these types of attacks now days are much easier to get into windows boxes then unix boxes. http://grc.com/dos/grcdos.htm is a very good resource for info. I have been receiving distributed denial of service attacks for about 9 months to a small site of my own off and on. After getting the server to be able to detect and cope with the volume of traffic to survive the hit, I still had a extreme volume of traffic coming into the server, which costs in bandwidth, so what I have done is setup round-robin DNS for my site, and when a attack comes in, block my own IP that is getting hit at the ISP, and legitimate traffic will flow to the other IPs. With a low DNS TTL this has been very effective. I also remove the attacked IP out of round-robin DNS when an attack is detected to minimize round-robin connect failures until the TTL's expire. Routers at ISPs have a setting they can set that would prohibit a spoofed packet to leave the ISP, packets could only be spoofed within the subnets they are routing for, many many many ISPs don't have this 'egress filtering' turned on. If a attack could be traced back to a real IP, the victim can get ahold of a botnet client on a infected computer, disassemble it to find out what central resource it's connecting to, then go to the provider of that central resource and get it shut down. Many botnets are coded with hostnames hosted off free web based DNS services so the botnets can be administrated easier, giving the attacker the ability to move the bots to different IRC servers. Getting that central hostname out of a single attack bot will disable a botnet assuming they don't have a alternative way into the drone computers. Josh |
|
|
|
|
|
#41 | |
|
Confirmed User
Join Date: Feb 2002
Location: Free Speech Land
Posts: 9,484
|
Quote:
|
|
|
|
|
|
|
#42 | |
|
Confirmed User
Join Date: Feb 2002
Location: Amsterdam
Posts: 9,377
|
Quote:
packets are really spoofed. If the attacker is in control of many different servers then it gets harder as the packets are real packets and are not being forged. There are so many bad secured servers on the internet that it's quite easy to root boxes and gain control while being completely stealth. LRK, Adore Kernel Plugin, Known exploits make it easy to install stuff on servers and be completely hidden. Many times the administrators never notice that their box has been compromised. They upload new versions of popular system programs like: ls, netstat, ps, pstree, slocate, traceroute, w, who, cp, mv, kill, killall, ping, etc, etc which won't list any connections/scripts that are being used by the hacker. These modified system programs have the exact same filesize and timestamp as the original ones that were installed on the server so they are quite hard to find. DynaMite
__________________
| http://www.sinnerscash.com/ | ICQ: 370820 | Skype: SinnersCash | AdultWhosWho | |
|
|
|
|
|
|
#43 |
|
Confirmed User
Join Date: Apr 2002
Location: Virgin - nee
Posts: 3,162
|
Mike, I know you guys will spare no expense in getting this taken care of - might I suggest that you contact Steve Gibson and bring him on board as a consultant during this attack?
He commonly deals with DDOS attacks and pulls them apart and finds a way to stop or deflect them. The closest associated emails I can find [email protected] and [email protected] and a phone number of 714-362-8800. Also definitely take a look at the IPs that the attacks are coming from (you should be able to take apart the attacks and determine if they're spoofed and what the true addy is) and start contacting the owners of those IPs. IE, if any of these attacks are coming from servers on the Rackshack network, send a captured sample of the attack to [email protected] and these emails: Patrick [email protected] Sen. Sys. Admin Mario [email protected] Customer Service Manager Greg [email protected] Support Team Manager Robert [email protected] Rackshack CEO and give them a call. Rackshack will be happy to investigate it on their end and start unplugging boxen (although I must say, if they notice any of their servers sending out abnormal amounts of packets like this, they'll unplug them on their own). I'd like to add to the discussion that it doesn't take a genius or a serious cracker to do this. One patient person with the right script and a list of IPs from a cable provider (like RoadRunner or Cox) can rack up insecure windows boxes left and right. Then the boxes open a connection to an irc chat room where they wait for their marching orders. Once the orders come in, the boxes all start sending traffic to the victim... and the owners of these computers on cable connections aren't even aware of it. Full-time "always on" connections with nice fat pipes and thousands of insecure boxen blindly following orders - ugh. The guys can also employ true servers in the attack, and it's the same for that, just running a script that searches for insecure boxen and then goes in and buries itself to await orders. I assume that this attack is from that Deepsy guy? |
|
|
|