|
FastMail Forum All posts relating to FastMail.FM should go here: suggestions, comments, requests for help, complaints, technical issues etc. |
|
Thread Tools |
11 Nov 2015, 03:33 PM | #31 | |
Cornerstone of the Community
Join Date: Sep 2013
Posts: 536
|
Quote:
I think this definitely proves that protonmail is not to be trusted. |
|
11 Nov 2015, 09:47 PM | #32 | |
Cornerstone of the Community
Join Date: Jul 2011
Posts: 713
|
Quote:
|
|
12 Nov 2015, 12:38 AM | #33 | |
Senior Member
Join Date: Jan 2013
Posts: 192
|
Quote:
EXACTLY. I wouldn't trust them as far as I could spit. |
|
13 Nov 2015, 12:31 AM | #34 |
Junior Member
Join Date: Nov 2015
Posts: 3
|
DDos Attacks are no joke
I'm a ProtonMail user, and this is the email we were sent by ProtonMail:
"Dear ProtonMail Community, As many of you know, last week ProtonMail came under a massive distributed denial-of-service (DDoS) attack which knocked our service offline for several days. Unfortunately, we were initially unable to defend against such a massive attack and suffered downtime as a result. Despite the ferocity of the attack, our server security measures and end-to-end encryption meant we were able to keep user data secure. This incident was one of the largest cyberattacks ever in Switzerland and caused enough damage to knock an entire datacenter offline. In an attempt to keep ProtonMail offline, upstream ISPs were also attacked, knocking hundreds of other businesses offline in countries as far away as Russia. The main attack began on Wednesday, November 4th, and it was not until the evening of Saturday, November 7th that we were able to bring the situation until control. Full details about the attack can be found on our blog here. There is no doubt that the purpose of the attack was to keep ProtonMail offline for as long as possible. In doing so, the attackers wanted to deny email privacy to nearly a million people worldwide. The attackers hoped to destroy our community, but this attack has only served to bring us all together, united by a common cause and vision for the future. Our vision for an Internet that respects privacy and freedom can be assaulted, but it will never be destroyed. Instead of weakening ProtonMail, these attacks have only made us stronger, and rallied more people to our cause. Collectively, the ProtonMail community raised $50,000 for the ProtonMail Defense Fund in just three days, giving us the resources to defeat the current attack and protect against future ones. In defending ProtonMail, we were joined by Radware, one of the world's premier DDoS protection companies. We also redesigned our network infrastructure to have a dedicated link to a Tier 1 carrier in Zurich. In addition to the privacy benefits of controlling all traffic in and out of our datacenter, this also makes our network far more difficult to attack. Our cause is also joined by IP-Max, the best network experts in Switzerland. The IP-Max team worked extremely long hours for several days in a row to bring us back up. And they did it entirely on a volunteer basis, simply to support our community. Building an entire network from scratch and bringing it online in a few days requires an incredible effort, and it was only with their assistance that we were able to come back online as quickly as we did. The result is that ProtonMail is now stronger than ever. Not only did we mitigate the largest DDoS attack in Switzerland in a couple days, we also gained the ability to resist such attacks in the future. We would like to thank the entire ProtonMail community for your many kind words of encouragement and support during this difficult time. We built ProtonMail for you, and it is truly an honor to have you standing behind us, in both good times and bad times. We look forward to continuing on this journey towards a more private and free Internet with all of you. Best Regards, The Entire ProtonMail Team" As an IT guy, I can tell you that 100GB DDoS attacks are no joke. They are very difficult to manage, if at all. It's easy to blackhole a single IP on an edge router; it's orders of magnitude more difficult when there are thousands of IPs to contend with. Yes, some of you are leery about the fact they "paid" and still had their rear ends handed to them. I agree that paying was a mistake, but let's all see how this plays out. |
13 Nov 2015, 01:17 AM | #35 | |
The "e" in e-mail
Join Date: May 2003
Location: mostly in Thailand
Posts: 3,095
|
Quote:
|
|
13 Nov 2015, 01:45 AM | #36 | |
Junior Member
Join Date: Nov 2015
Posts: 3
|
Quote:
Per the email I posted above and their own blog, they have taken the necessary steps to help mitigate this kind of attack in future. As Bruce Schneier is fond of saying, "security is a process, not a product". So very true. No amount of router security, firewall security, you name it is going to do any good unless you have a process to deal with the problem should it arise. Apparently some very talented network people stepped up to assist them so they should be well taken care of going forward. As always, I'm glad to see FM's usual QC shine through with this. I somehow doubt NYI doesn't have the chops to deal with these issues, as they are one of the best in the business, if not the best in the US. |
|
13 Nov 2015, 05:04 AM | #37 | |
Master of the @
Join Date: May 2012
Location: Melbourne, Australia
Posts: 1,007
Representative of:
Fastmail.fm |
Quote:
I've seen and heard of responses ranging from "we'll just blackhole your network" to "what's a DDos?" to "good luck!". I heard of one case where the network provider terminated a contract in response to a DDoS. Nothing like from NYI - no excuses, no blame, just got on with fixing the problem. Incidentally, this is why it's so hard to choose secondary datacentres. NYI have spoiled us rotten so no one else will ever look as good, and it's really hard to know beforehand how they will respond in a crisis. |
|
13 Nov 2015, 06:37 AM | #38 | |
Junior Member
Join Date: Nov 2015
Posts: 3
|
Quote:
Thanks again for your own stellar product with FM. Been a user for almost 10 years for my primary email accounts and see no reason to even look at anyone else. |
|
13 Nov 2015, 09:24 AM | #39 |
Master of the @
Join Date: Oct 2001
Location: Boston USA
Posts: 1,065
|
fastmail seems to be down
Boston Mass USA 20:23 EST
|
13 Nov 2015, 09:31 AM | #40 |
Junior Member
Join Date: Feb 2009
Location: Moscow, Russia
Posts: 24
|
Already up. It seems, 10 minutes of network problems.
|
14 Nov 2015, 01:43 PM | #41 |
Master of the @
Join Date: Oct 2001
Location: Boston USA
Posts: 1,065
|
Boston USA is down ...
... as of 12:43 EST
|
14 Nov 2015, 01:45 PM | #42 |
Master of the @
Join Date: Oct 2001
Location: Boston USA
Posts: 1,065
|
working fine now
working fine now
|
14 Nov 2015, 02:40 PM | #43 |
Intergalactic Postmaster
Join Date: May 2004
Location: Irving, Texas
Posts: 8,929
|
Rob Mueller interview about DDOS attacks
Yes, as was warned in the Fastmail blog, DDOS attacks on various email providers are happening this week. You can see the resolution at the Fastmail status page, which provides much more transparency than most other email providers:
http://www.fastmailstatus.com/ Rob Mueller of Fastmail was interviewed about these latest DDOS attacks here: Ransom attacks likely to fade as small email providers resist Bill Last edited by n5bb : 14 Nov 2015 at 02:53 PM. Reason: Added interview link |
14 Nov 2015, 11:26 PM | #44 |
Master of the @
Join Date: Oct 2001
Location: Boston USA
Posts: 1,065
|
Thanks. Good references.
|
17 Nov 2015, 06:10 AM | #45 |
Essential Contributor
Join Date: Dec 2008
Location: Canada
Posts: 312
|
Detailed account of the ProtonMail DDoS attack.
TechRepublic, Nov 13 Inside the ProtonMail siege: How two small companies fought off one of Europe's largest DDoS attacks What started as a simple digital ransom quickly escalated into a trans-continental networking battle |