[190764] in North American Network Operators' Group
Re: cloudflare hosting a ddos service?
daemon@ATHENA.MIT.EDU (Phil Rosenthal)
Tue Jul 26 22:21:27 2016
X-Original-To: nanog@nanog.org
From: Phil Rosenthal <pr@isprime.com>
In-Reply-To: <CAJL_ZMMkwSfJTEwOzJ0OFLQ0GouEN2c2UxMfgUyJDxJMABCe+w@mail.gmail.com>
Date: Tue, 26 Jul 2016 22:17:53 -0400
To: jim deleskie <deleskie@gmail.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
Plus, it=E2=80=99s good for business!
-Phil
> On Jul 26, 2016, at 10:14 PM, jim deleskie <deleskie@gmail.com> wrote:
>=20
> sigh...
>=20
> On Tue, Jul 26, 2016 at 10:55 PM, Patrick W. Gilmore =
<patrick@ianai.net>
> wrote:
>=20
>> CloudFlare will claim they are not hosting the problem. They are just
>> hosting the web page that lets you pay for or points at or otherwise
>> directs you to the problem.
>>=20
>> The actual source of packets is some other IP address. Therefore, =
they can
>> keep hosting the web page. It is not sending the actual
>> [spam|DDoS|hack|etc.], right? So stop asking them to do something =
about it!
>>=20
>> Whether you think that is the proper way to provide service on the
>> Internet is left as an exercise to the reader.
>>=20
>> --
>> TTFN,
>> patrick
>>=20
>>> On Jul 26, 2016, at 9:49 PM, Mike <mike-nanog@tiedyenetworks.com> =
wrote:
>>>=20
>>> Hi,
>>>=20
>>> So vbooter.org's dns and web is hosted by cloudflare?
>>>=20
>>> "Using vBooter you can take down home internet connections, websites =
and
>> game servers such us Minecraft, XBOX Live, PSN and many more."
>>>=20
>>> dig -t ns vbooter.org
>>>=20
>>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t ns vbooter.org
>>> ;; global options: +cmd
>>> ;; Got answer:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 62177
>>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
>>>=20
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 512
>>> ;; QUESTION SECTION:
>>> ;vbooter.org. IN NS
>>>=20
>>> ;; ANSWER SECTION:
>>> vbooter.org. 21599 IN NS rick.ns.cloudflare.com.
>>> vbooter.org. 21599 IN NS amy.ns.cloudflare.com.
>>>=20
>>> dig -t a www.vbooter.org
>>>=20
>>> ; <<>> DiG 9.9.5-3ubuntu0.8-Ubuntu <<>> -t a www.vbooter.org
>>> ;; global options: +cmd
>>> ;; Got answer:
>>> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34920
>>> ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
>>>=20
>>> ;; OPT PSEUDOSECTION:
>>> ; EDNS: version: 0, flags:; udp: 512
>>> ;; QUESTION SECTION:
>>> ;www.vbooter.org. IN A
>>>=20
>>> ;; ANSWER SECTION:
>>> www.vbooter.org. 299 IN CNAME vbooter.org.
>>> vbooter.org. 299 IN A 104.28.13.7
>>> vbooter.org. 299 IN A 104.28.12.7
>>>=20
>>>=20
>>> Can anyone from cloudflare answer me why this fits with your =
business
>> model?
>>>=20
>>> Mike-
>>=20
>>=20