How to destroy someone who hosts stuff at Hetzner dedicated server
DDoS is a common problem many companies are facing, but Hetzner's policy on that is really crap. If someone starts DDoS on your dedicated, after several minutes they just shut down your dedicated from network, and send you an email like "We disabled your network because you have DDoS attack on your server. Write us an email to reenable your network". And of course, several hours later I saw that email and tell them "Okay, please enable my network", but boom, I will have to wait Monday, because their support that can ACTIVATE network on a dedicated works only from Mondays to Fridays ... And then the person who attacked me sends me anonymous email like "lol, I bought 5$ packet at [some random booter/network stresser website], and I have put you offline for few days for only 15 minutes of DDoS, HAHAHAHA"
So basically yea, start small flood from random VPS/dedicated or whatever that is 100mbit or more, leave it on for several minutes until Hetzners system automatically disable network from person you are attacking, and look at them being offline for few days :) I'm ordering a new dedicated from someone else now, no more Hetzner...
[+] [-] MehdiEG|12 years ago|reply
You get great support (always had phone calls answered pretty much instantly and emails answered within a few minutes and all the techs I've dealt with knew what they were doing).
You can issue automated hardware resets and even get a remotely-controlled KVM attached to tweak the BIOS or regain access to your machine if you messed up the networking config (usually only takes a few minutes to get the KVM attached).
Orders for new hardware are also really fast - dealt with within the hour and often in under 15 minutes.
But there's no such thing as a free lunch. If you host at Hetnzer, you have to be aware of the reasons why they're so cheap, namely:
1) The servers are 100% unmanaged. They'll install new hardware for you if you ask them but everything else is up to you.
2) A lot of their hardware is desktop-grade, e.g. Intel Core i7 CPUs and non-ECC RAM. They do have some server-grade hardware in their high-end range however.
3) Their servers are in Germany. So you get quite a bit of latency if accessed from Asia or the West Coast of the US (see [2]).
4) They don't have any DDoS protection. In case of a DDoS, your server will get null-routed (but they tell you first). Again: 100% unmanaged. Up to you to deal with it. I've been lucky enough to not have to deal with a DDoS but my first port of call would probably be CloudFlare it it happened.
Provided that you're happy to do some sys admin, Hetzner is brilliant for a personal server, a CI server or even a prod server for a bootstrapped startup.
For literally next to nothing, you get a really powerful machine that will easily handle big traffic spikes without a breaking a sweat. And dedicated machine means that you get excellent and consistent CPU performance and disk I/O. If and when your startup takes off and you get funding, you can then choose between hiring a sys admin or moving to a more expensive host that offers a more managed setup.
[1] http://www.hetzner.de/en/hosting/produktmatrix/rootserver-pr...
[2] https://news.ycombinator.com/item?id=3898714
[+] [-] wazoox|12 years ago|reply
[+] [-] Duckeh|12 years ago|reply
I can't say I've ever heard of Hetzner, but from the comments I'm reading they apparently offer servers for cheap. Bearing in mind how much money DDoS mitigation costs I don't see how they could handle this any other way without having to make some pretty serious investments (which in turn would make their hosting less cheap as the money has to come from somewhere, right?)
[+] [-] patrickg_zill|12 years ago|reply
There are other ways to do it via BGP also. Plus there is null-routing, bandwidth limiting, etc.
[+] [-] metabrew|12 years ago|reply
At one point they just suggested we "ask the responsible parties to stop", and closed the ticket.
Now we are on Black Lotus. Expensive, but the regular 50mb-10gbit ddos attacks are mitigated just fine.
[+] [-] metabrew|12 years ago|reply
Excellent value for money dedicated servers, with good automated systems. You can remotely reboot a dedicated server into a recovery image and fix problems yourself. You can run the install process yourself too, so you get exactly what you want... except ddos mitigation.
[+] [-] revelation|12 years ago|reply
I have no particular insight into why IRC is so troubling, it used to be popular for malware botnets (C&C) and it attracts its fair share of script kiddies.
[+] [-] tribaal|12 years ago|reply
[+] [-] glomph|12 years ago|reply
[+] [-] Lazare|12 years ago|reply
[+] [-] sillysaurus2|12 years ago|reply
Thanks for both!
[+] [-] spindritf|12 years ago|reply
OVH's much more tolerant in that regard (ie. they keep your server online if battered) and all their servers now include a mandatory anti-ddos protection[1]. Unfortunately, they're fighting turn-over and don't accept new orders.
[1] http://forum.ovh.co.uk/showthread.php?t=6661
[+] [-] oellegaard|12 years ago|reply
Sounds like you were unfortunate, but this is not generally what they do.
[+] [-] leokun|12 years ago|reply
[+] [-] turshija|12 years ago|reply
[+] [-] level09|12 years ago|reply
I guess I will still keep the server, but will have to work on a quick migration/failover plan in case I encounter something similar.
I have also started using cloudflare as my default DNS host, so that could also be a possible solution.
[+] [-] turshija|12 years ago|reply
[+] [-] Qantourisc|12 years ago|reply
Everybody is probably "happy" then: Customer-> their unusable DDoSed server is disconnected, but wasn't reachable anyway. But once the DDoS is over, it's back online. Provider -> they have their traffic routed to null. However, they will have to do some more work to get this working too. And not to mention happier customers.
[+] [-] codexon|12 years ago|reply
http://www.hackforums.net/forumdisplay.php?fid=232
[+] [-] verroq|12 years ago|reply
[+] [-] andrew_wc_brown|12 years ago|reply
[+] [-] qohen|12 years ago|reply
http://www.dosarrest.com/
BTW, does anyone know how what their prices are like?
(Their site doesn't have seem to have pricing info, just "Get a Free Quote" forms.)
[+] [-] csense|12 years ago|reply
A DDoS is nothing more than thousands or millions of machines saying:
How do the solutions others are talking about in this thread (DDoS mitigation provider or specialized hardware) tell the difference between DDoS traffic and legitimate requests?[+] [-] turshija|12 years ago|reply
If I'm online during the attack and check iptraf or tcpdump, I can see literally hundreds of different IPs spamming random stuff at me, completely overflowing my download until I get totally disconnected from server (time out), and I can do nothing about it, just watch it being offline ...
[+] [-] lb0|12 years ago|reply
Or are they unable to properly detect a DDoS and would also take off a server that hosts a web page mentioned on Hacker News?
How do other hosters handle this situation?
[+] [-] 4hthth4|12 years ago|reply
[+] [-] onestone|12 years ago|reply
[+] [-] devicenull|12 years ago|reply
[+] [-] _s|12 years ago|reply
[+] [-] swinglock|12 years ago|reply
[+] [-] linas|12 years ago|reply
[+] [-] turshija|12 years ago|reply
[+] [-] ianhawes|12 years ago|reply
[+] [-] aroch|12 years ago|reply
There are a couple NBA.com subdomains and Der Speigel appears to be hosting 'local' CDNable content for their Germany-based readers
[+] [-] AznHisoka|12 years ago|reply
[+] [-] vertis|12 years ago|reply
[+] [-] Demiurge|12 years ago|reply
[+] [-] turshija|12 years ago|reply
[+] [-] na8ur|12 years ago|reply
[+] [-] bolder88|12 years ago|reply
Linode for example will null-route your linode for 24 hours if it's attacked.
It's quite irritating that hosting companies seem to see null-routing as a solution to a DDoS attack.
[+] [-] zzzcpan|12 years ago|reply
[+] [-] devicenull|12 years ago|reply
[+] [-] patrickg_zill|12 years ago|reply
(EDIT: of course Hetzner could choose to mitigate the DDOS by any number of methods - but they choose not to, because they have made a conscious decision based on cost.)
[+] [-] lucb1e|12 years ago|reply
[+] [-] devicenull|12 years ago|reply
[+] [-] turshija|12 years ago|reply
[+] [-] zzzcpan|12 years ago|reply
[+] [-] unknown|12 years ago|reply
[deleted]
[+] [-] ye|12 years ago|reply
[+] [-] synergy-ek|12 years ago|reply
[deleted]