so, what's the impact? will this now cause less than the usual constant disconnects and connection losses that Blizzard always has? (because the servers are at the moment otherwise occupied) -- or more?
Since those are Blizz servers I guess they just received 5-7 more connections, lags are huge problem since long time, feels like they downgraded hardware by at least 1/3.
Yes yes, is all DDOS attacks, is not like the servers are trash and need physical improvements...
So stupid people continue to do this sort of thing. Grow up and don't make it any tougher for the rest of us.
i think they've done it due to lack of items in the game, jesus, they deserve it rofl, sorry not sorry, bring back ilvl to m+ and more items for raids lol. Cause now the grinding is on gear, and its really tiresome. The grinding on systems past expansions weren't this time consuming and don't lie to urselves.
People who are doing this, really have to much time...
I gonna be that guy that gives you guys an actual answer (from a cyber-security POV). No there is no easy way to mitigate Distributed-Denial of Service attacks. To understand this you have to understand that there are 2 categories (with multiple sub-categories) of attack-classes for DDoS attacks.1. Bandwitch depletion2. Resource Depletion Most common attack classes world-wide are a combination of type 1 and type 2. Type 1 consists of Flooding (UDP / ICMP) and Amplification Attacks (aka Reflection Attacks). DNS-Reflection can be done via multiple Protocols (SSDP, DNS, NetBIOS, Bit Torrent, LDAP, CLDAP, Memcached (depreciated), Steam Protocol etc.)DDoS Attacks are dirt cheap. E.g.: 1 Gold-Lifetime Abo for DDoS Attacks costs about 50 Euro / USD (1 Concurrent Attack, 600 Sec of Boot time and 125 Gbps network-capacity)To Give you an idea. Amazon was attacked 2020 vis CLDAP and the attack peaked at 2,3Tpbs (Amplification factor of about 57)How to mitigate:DDoS Mitigation Device (Features, Functions):Recognizes invalid malforemed packets, invalid, TCP/UDP Checksums, Malformed IP Header, invalid TCP Flags, Spoofed IP Adresse, UDP Floods, TCP Floods (SYN, DNS, Zombie-Packets), Protcol specific defense mechanism.You actually can't do it yourself once you are bigger. Most big companies have either so-called mitigation devices that analyze the traffic before it reaches the firewalls or load balancers. If the mitigation devices fail (resource/bandwidth depleted) The traffic gets redirected to a so-called scrubbing center which is literally a server-farm that does exactly the same stuff the dedicated mitigation device does but on a much bigger scale.For smaller companies there is cloud-flare (cloud-solution) that does exactly the same stuff I described above
Been lagging since the expansion is out, typically in the zone where the best reward is.
Call me crazy, call me insane but...1/ Don't have the login servers on the same ip address as your game servers and/or pc.2/ Then you have the login server send the world server ip address to the players client. And you do this through onion routing of some sort.
Please keep the discussion relevant to the article and be respectful to each other. Thank you!