I'm jumping in here because I think it's important to understand
the challenges of ddos protection at a more sophisticated level
than 'cloudflare is free!'.
If you are just trying to publish some set of static content, there
are a variety of methods you can use to do strong ddos protection
on the cheap. All of them rely on getting lots of free or cheap
bandwidth, whether through a big hosting provider like blogger,
through a free cdn like cloudflare, or through a small human rights
oriented protection service that subsidizes the bandwidth cost in
some way. That bandwidth just helps serve mostly static content,
though, and doesn't by itself keep an interactive site functional
in the face of an attack.
To keep the interactive features of a site (like avaaz.org) up, you
have to make pretty deep changes in how the site works to be ddos
resistant. And that usually involves working with some company or
organization that is expert in ddos protection. That means hiring
a company like the one that avaaz is evidently using (I have no
specific knowledge of that company, but there is a whole class of
companies like it), and they are expensive.
And once you are having to embed the ddos protection into the
site's functionality rather than just its content, it's a lot
harder to leverage the free sources of content bandwidth. I'm
pretty sure this is cloudflare's business model -- providing the
simple content bandwidth for free but leveraging their (likely
justly earned, though I haven't tested it) reputation in order to
charge for the expertise to protect more complex, interactive
sites.
When we queried services a couple of years ago for our ddos report,
we were routinely quoted numbers around $10k a month for protection
up to 10G of traffic. There are lots of small hosting companies
that 'guarantee' protection up to 1G, but the guarantee is just to
get your currently monthly bill refunded, hardly what's needed in
the face of an attack. And the routine quote of $10k / month was
just for the basic bandwidth and filtering systems, not including
any custom work on the interactive parts of the site.
There are certainly human rights oriented individuals and,
increasingly, smallish organizations who are providing these sorts
of ddos protection services. I'm generally supportive of those
efforts and know of cases in which they have smartly done enormous
good. But those individuals and orgs are all subsidized in some
way or another, through some combination of private and public
funding, donations of backbone bandwidth, and donations of their
own expert time. They can be lifelines for small, independent
media and activist organizations who can't possibly afford the
going commercial rate of> $10k / month for ddos protection.
But I would actually much rather see an relatively big organization
like Avaaz with its own strong fund raising capability raise its
own money to pay the actual cost for protecting its site than
relying on one of these subsidized sources (and thus driving out
other, smaller potential clients of those subsidized sources).
There's obviously need for Avaaz to be open about how its raising
and spending its money. But I just disagree with the premise that
ddos protection is cheap or easy.
-hal
On 5/8/12 1:51 PM, jim youll wrote:
Having dealt with these problems at various scales (but perhaps
not at this scale-the facts are fuzzy) i am made very uneasy by
the amount of money that is claimed both spent and additionally
necessary for "DDOS protection." Those would be appropriate sums
to pay an extortionist as "protection money" but they seem to be
talking about technology spending here, and the whole story is
just too much hyperbole and not much that seems reasonable at any
scale, particularly the overt declaration that "DDOS protection"
(whatever that means) is a linear function of money applied (
above a threshold that imo should have been passed several tens
of thousands of dollars ago)
Yosem Companys<[email protected]> wrote:
*Message from Ricken on Avaaz cyberattack: *
Hi all - I've heard there's some concern on your list about
Avaaz's DDoS trouble. Thanks so much for the offers of help,
much appreciated and I know some of you have been great allies in
the past, but I think we've got great people working on it and
the attack ended last week. Also surprised to hear some of you
thought we made this up! If you want to ask a third party,
Datagram, Arbor Networks and to lesser degree Croscon were the
three groups involved that we asked for advice and help from.
The other concern I heard is, was this an exaggerated
fundraising ploy? Datagram told our tech team it was one of the
largest attacks they'd seen, and if we hadn't just 8 weeks ago
spent $35k on much fancier DDoS protection it would have
completely disabled our site for days. They also said the
attacker was constantly adapting to our defenses, the attack was
surprisingly sustained, and a key origin appeared to be Amsterdam
where we were told some groups for hire operated from -
suggesting someone was paying for this. All that triggered our
level of concern in writing the fundraiser. Over the last 6
months, we've grown by an average of almost 300,000 people per
week, so being disabled for a few days can be super costly. When
we brought the guys from Arbor Networks in, they dialed down the
concern a little bit, questioning the amsterdam part, and saying
it was bigger than the large majority of DDoS attacks, but much
larger ones were possible. But that last bit also dialed up our
concern, because we knew we were at the limits of what we could
handle and we didn't have budget for more. That had been the main
reason for the fundraiser.
And yes, of course we need the money - both for more DDoS
protection and also for ramping up our tech security across the
board - there was a short list of things in the email. That list
also dealt with a wider range of needs, including the physical
security of our staff in places like Russia and Lebanon, which
also has a tech security component to it. Our community was
extremely supportive so we ended up raising more than we need
immediately, but this is the first appeal like this we've done in
5 years and we probably won't do another for a long while, so the
money has to last. That's part of how online organizing works -
you leverage bursts of engagement with particular campaigns and
issues to support longer term objectives sustainably. If we find
that our plans mean we don't anticipate using a lot of the money
for the purpose raised, we email the donors and ask them to
either request a refund or tell us what we can use the remainder
of t he funds for.
Hope that helps, and I hope you'll forgive us for a few days
delay in replying and not being able to engage and collaborate
with you all like we would if we were more a part of your
community. We have a small team working in a dozen languages with
staff spread across the world, and cover an enormous number of
issues in an enormous number of countries. We run about 10-14
campaigns per week, and every campaign we run has a relevant
civil society community and often several in different countries
(e.g. a French tech community is also demanding our engagement on
this one, and even threatening us with a DDoS attack if we
don't!). So while I am told that you have norms about
collaboration and engagement among you, I regret that we can't
follow them. Hope you'll forgive us and judge us by the quality
of our work over time. Good luck to you with yours.
Ricken
_______________________________________________ liberationtech
mailing list [email protected]
Should you need to change your subscription options, please go
to:
https://mailman.stanford.edu/mailman/listinfo/liberationtech
If you would like to receive a daily digest, click "yes" (once
you click above) next to "would you like to receive list mail
batched in a daily digest?"
You will need the user name and password you receive from the
list moderator in monthly reminders. You may ask for a reminder
here:
https://mailman.stanford.edu/mailman/listinfo/liberationtech
Should you need immediate assistance, please contact the list
moderator.
Please don't forget to follow us on
http://twitter.com/#!/Liberationtech
-- Hal Roberts Fellow Berkman Center for Internet& Society Harvard
University