Matw wrote:
So null routing is the only effective response to a DDoS attack? I imagined there would be a whole lot of precautions / responses that a hosting provider could use before such an expensive solution was needed...
Well, "effective" is a spectrum and sort of depends on how you define it, but that's why DDoS attacks are so nasty. Most of their impact comes from the fact that they are tying up inbound bandwidth and/or resources on the target machine, so the damage is already done if the packets reach their target at all in the first place. The only absolutely guaranteed remedy is always upstream of wherever the most damaging choke point is.
If the DDoS is not saturating the inbound network path, but just bogging down an application on a single VPS, blocking it via local filters (so it gets dropped at the network layer before the app sees it) can be effective. Less so if the basic packet processing load is high enough to bog down the VPS even without the packet reaching an app. And that's something you can do yourself. Odds are decent that in such cases, neither Linode nor the data center might even notice unless the bandwidth usage was hurting other hosts.
The next level would be traffic sufficient to bog down the overall Linode host (not just your VPS), which might be able to be dealt with at the host level, but would need Linode's involvement.
But the moment the total traffic load begins to bog down network infrastructure itself, you have to attack it upstream, since otherwise it's already using the network capacity before any other point where it can be filtered.
-- David