RE: Recommended DDoS mitigation appliance?

2020-02-04 Thread Kushal R. via NANOG
If you are looking for remote scrubbing, I can high recommend DDoS-Guard 
(ddos-guard.com), they do not have any “limits” on the size or the number of 
attacks, the billing is simply based on the clean bandwidth. The highest they 
have mitigated for us is about 40G. You can either have it in an always on 
mode, with all incoming traffic coming via their 4 POPs (Los Angeles, 
Amsterdam, Hong Kong or Almaty) or you can use something like FastNetMon or 
DDoS-Guard’s own application that runs on any hardware and use eBGP to route 
the victim /24 over DDG’s network.

--

Kushal R. | Management
Office: +1-8557374335 (Global) | +91-8080807931 (India)

WhatsApp: +1-3104050010 (Global) | +91-9834801976 (India)

host4geeks.com
host4geeks.in



On 4 Feb 2020, 7:22 PM +0530, Phil Lavin , wrote:
> > So is Imperva similar to how Kentik operates? What was it priced liked?
>
> It is a nice model as you don't need additional hardware or virtual 
> appliances on-prem, which cuts down on the CAPEX cost. Like everyone else, 
> they price the scrubbing based on your clean traffic levels. Price I have is 
> circa $73,000 a year for 250mbit clean traffic and circa $94,000 a year for 
> 500mbit clean traffic. Reasonably good value if you get attacked a lot - a 
> very expensive insurance policy if not. Yearly pricing is broadly on par with 
> Radware, Arbor and A10 (Verisign).


Re: Prefixes blocked by Verisign, can’t reach Root DNS Server?

2020-01-23 Thread Kushal R. via NANOG
Someone contacted off the list and got this sorted.

--

Kushal R. | Management
Office: +1-8557374335 (Global) | +91-8080807931 (India)

WhatsApp: +1-3104050010 (Global) | +91-9834801976 (India)

host4geeks.com
host4geeks.in



On 23 Jan 2020, 11:20 PM +0530, "Kushal R." , wrote:
> Hi all,
>
> Anyone from Verisign available here and can contact off the list?
>
> It appears that a couple of our prefixes are being blocked from reaching a 
> root DNS server hosted there.
>
> Thanks.
>
> --
>
> Kushal R. | Management
> Office: +1-8557374335 (Global) | +91-8080807931 (India)
>
> WhatsApp: +1-3104050010 (Global) | +91-9834801976 (India)
>
> host4geeks.com
> host4geeks.in
>
>
>


Prefixes blocked by Verisign, can’t reach Root DNS Server?

2020-01-23 Thread Kushal R. via NANOG
Hi all,

Anyone from Verisign available here and can contact off the list?

It appears that a couple of our prefixes are being blocked from reaching a root 
DNS server hosted there.

Thanks.

--

Kushal R. | Management
Office: +1-8557374335 (Global) | +91-8080807931 (India)

WhatsApp: +1-3104050010 (Global) | +91-9834801976 (India)

host4geeks.com
host4geeks.in





Re: new BGP hijack & visibility tool “BGPalerter”

2019-08-14 Thread Kushal R. via NANOG
This is great. Will be testing this later in the day. We like a lot of others 
were using BGPMon.

— Kushal R. Executive Management | Host4Geeks
Email: kusha...@h4g.co Skype: kush.raha Phone (Text/WhatsApp): +1-310-405-0010 
[tel:+1-310-405-0010] (Global) / +91-8830547876 [tel:+91-8830547876] (India)
On Wed, Aug 14, 2019 at 10:19pm, Eric Lindsjö < e...@emj.se [e...@emj.se] > 
wrote: On 8/14/19 4:54 PM, Job Snijders wrote:
> Dear NANOG,
>
> Recently NTT investigated how to best monitor the visibility of our
> own and our subsidiaries’ IP resources in the BGP Default-Free Zone.
> We were specifically looking how to get near real-time alerts funneled
> into an actionable pipeline for our NOC & Operations department when
> BGP hijacks happen.
>
> Previously we relied on a commercial “BGP Monitoring as a Service”
> offering, but with the advent of RIPE NCC’s “RIS Live” streaming API
> [1] we saw greater potential for a self-hosted approach designed
> specifically for custom integrations with various business processes.
> We decided to write our own tool “BGPalerter” and share the source
> code with the Internet community.
>
> BGPalerter allows operators to specify in great detail how to
> distribute meaningful information from the firehose from various BGP
> data sources (we call them “connectors”), through data processors
> (called “monitors”), finally outputted through “reports” into whatever
> mechanism is appropriate (Slack, IRC, email, or a call to your
> ticketing system’s API).
>
> The source code is available on Github, under a liberal open source
> license to foster community collaboration:
>
> https://github.com/nttgin/BGPalerter
>
> If you wish to contribute to the project, please use Github’s “issues”
> or “pull request” features. Any help is welcome! We’d love suggestions
> for new features, updates to the documentation, help with setting up a
> CI regression testing pipeline, or packaging for common platforms.
>
> Kind regards,
>
> Job & Massimo
> NTT Ltd
>
> [1]: https://ris-live.ripe.net/

Excellent, now I don't have to write it myself. Looking forward to
testing. Thanks for sharing the fruits of your labor with the community.


Kind regards,
Eric

Re: Intermittent "bad gateway"

2019-07-02 Thread Kushal R. via NANOG
Most likely referring to the CloudFlare issue - 
https://www.cloudflarestatus.com/incidents/tx4pgxs6zxdr
—
Kushal R.
Executive Management | Host4Geeks

Email: kusha...@h4g.co
Skype: kush.raha
Phone: +1-310-405-0010

On 2 July 2019 at 7:54:26 pm, Ross Tajvar (r...@tajvar.io) wrote:

Gotta be more specific than that...

What carrier(s) are you using? If you do a traceroute do your packets take a 
weird path? Etc.

On Tue, Jul 2, 2019, 10:19 AM Stephen Satchell  wrote:
Are we having another BGP problem this morning?