*** The Official Xbox One Thread ***

Soldato
Joined
13 May 2008
Posts
3,651
Location
Leicester
Looks like that deal didn't last long, we've all just been kicked saying communication to xbox live has been interrupted. They have also tweeted again xboxoffline
 
Last edited:
Soldato
Joined
6 Sep 2003
Posts
3,497
Location
Somerset
I'm seriously considering selling my One again already. Not only has it taken a million years to install a sodding game again as usual, I managed to get online for an entire five seconds to be greeted with an 18GB update which keeps failing.

I know MCC is a large title with some hefty updates, and the DDOS couldn't be helped but I'm really starting to lose any interest at all now.
 
Soldato
Joined
13 Aug 2008
Posts
7,080
NEOGAF said:
Much like swatting, it's rather difficult to trace the action of a ddos back to the actual instigator, since the instigator is so far removed from the situation.

Here's a loose and totally imaginary scenario, but it illustrates the point:
Attacker wants to initiate a large-scale DDoS attack on a site.
Attacker coerces a stranger to take an action for them, either by threatening them online (I have nudes of you, etc - you'd be shocked how often that works) or by taking something of theirs hostage (like using a cryptolocker variant that encrypts a person's HDD after they download a malicious file - the malware then phones home to a dead drop like an IRC channel, which the Attacker connects to via several layers of spoofing and anonymizing.
So now the Attacker has a Rube they can give commands to, like, download this file, install it, run it, enter in such and such information, and your credit card details.
What Rube has now done, is paid for airtime on one of many black market botnets - massive networks of zombie computers all infected with malware, that don't even know they're infected.
Rube's payment goes through, and Attacker gets the pass for the botnet from Rube. Attacker never sees Rube again, and Rube still has no idea who encrypted their HDD.
Now, Attacker logs into botnet - which is just an IRC channel somewhere with a password on it (via lots of proxies, etc), and tells it to attack a series of IPs. Like say, the IP addresses that show up when you do a very basic packet sniff of your network when the Xbox boots and connects to XBL. You can't hide those ip adresses, the TCP protocol is rather honest to a fault.
So now, the botnet wakes up, and millions of zombie PCs all start sending SYN packets to the IP addresses. Some of the servers, seeing the familiar SYN request for a synchronize, answer. They have to - that's how the internet works. They ACK, acknowledge. Now they wait for a SYN-ACK from the client who was trying to connect. Except the client isn't trying to connect, and while this was happening, a million other SYN requests came in. And the server has to ACK them all, and if it tries, it falls over.
However, most servers have mitigation in place - which is a complex process, this video explains it better: http://www.dailymotion.com/video/x14...os-attack_news
At best, the mitigation keeps the server alive, but now end-users might find themselves having a hard time connecting, since there's all this checking going on. They might go into a queue, or just be denied outright and told to try later.
And so the botnet continues to slam the servers, and others along the way, depending on how the command and control is set up. If it can't take down its target, it tries for one layer back, like the datacenter, or the ISP the datacenter uses, or the main trunk that leads to that ISP, and so fourth.

Meanwhile, who is Attacker? Nobody knows. How do you find out? That's a damn hard question to answer. You might, at best, discover Rube through investigations, and initially think Rube is Attacker, since they paid for the botnet access - but Rube claims innocence, but there's no way for anyone to figure out who Attacker was. Unless Attacker was sloppy, and left something in the malware that might lead back to them. Perhaps the investigation might get to the IRC channel the info is shared on, and the investigation team "fakes" being caught in the malware encryption trap, and tries to use the situation to get Attacker to out themselves. That's happened once or twice, but it's still rare.

(Ack, sorry for the wall of text)
 
Soldato
Joined
26 Jan 2006
Posts
12,365
Location
Belfast
Yea, BF4 servers are ALL down..of course EA..of course...still not working right years on, and on double XP days as well.
 
Last edited:
Associate
Joined
1 Aug 2004
Posts
1,249
Location
North East
Xbox Live status page says otherwise

27/12/2014 22:03:37 GMT:

Are you having issues signing in to Xbox Live? We’re looking in to it! We appreciate your patience in the meantime. Check back in 30 minutes for an update on this issue.
 
Soldato
Joined
10 Apr 2009
Posts
8,709
Location
Super Leeds
I'm seriously considering selling my One again already. Not only has it taken a million years to install a sodding game again as usual, I managed to get online for an entire five seconds to be greeted with an 18GB update which keeps failing.

I'm seriously considering buying a One. PSN just seems to flaky for online. Might use my PS4 for exclusives and SP games and get a One for any online games I fancy.
 
Soldato
Joined
13 Aug 2008
Posts
7,080
I'm seriously considering buying a One. PSN just seems to flaky for online. Might use my PS4 for exclusives and SP games and get a One for any online games I fancy.

PSN has maintenance on the odd Monday night and messages can be a bit slow and that's what people cry about.

You can't blame MS or Sony for the current problems imo. Both seem to be struggling to restore their service are what was a really big ddos attack. It's not just Sony or MS to consider either, the attack will have caused problems at their ISPs, and other ancillary providers for them.
 
Back
Top Bottom