On Sat, Aug 21, 2010 at 3:04 PM, Thomas Grimshaw <t...@streamsense.net> wrote:
>  Loading 1mb of content per user is hardly a denial of service attack.
> Crosslinking occurs everywhere on the web, this is simply nothing but
> paranoid bull.

This isn't normal crosslinking. The images and content loaded weren't
actually used for anything - they were all hidden in a 1-pixel DIV to
make them totally invisible to the user. (The Emerald developers
wouldn't want them to be displayed on the login screen since many of
the images were ones showing they'd been up to no good.)

You also have no idea how often the Emerald login screen is viewed, do
you? I'll give you a hint - this apparently worked out at around
70-120 GB per day of data transfer[1]. At the cheaper end of excess
bandwidth charges, this could easily have cost a victim £200 per day
or more - most people don't have over 2 terabytes of monthly transfer
allowance included in their web hosting plan, which is how much
would've been needed to withstand this attack. Before the Emerald
developers upgraded their webserver to something seriously beefy, just
the normal requests for the login screen were bringing their website
to a standstill, and the number of users has only increased since
then.

And the bandwidth usage isn't even the main DDoS vector. The Emerald
login screen was set up to waste lots of server CPU time by making 20
worthless requests for PHP-generated content on the victim server
every time someone viewed it. That did cause some real performance
issues for the victim site - shared hosting really can't cope with
this kind of request rate for dynamically-generated content.

[1] 
http://www.sluniverse.com/php/vb/general-sl-discussion/47885-emerald-problem-conspiracy-theory-5.html#post999709
_______________________________________________
Policies and (un)subscribe information available here:
http://wiki.secondlife.com/wiki/OpenSource-Dev
Please read the policies before posting to keep unmoderated posting privileges

Reply via email to