macole111
04-08-2013, 13:31
That is always one of the things about OVH, auto detection then sudden suspension - even if nothing is wrong. It makes me think twice before using them for enterprise/mission critical applications.
-macole111
-macole111
7.4
For security reasons, OVH reserves the po
ssibilité to proceed with the immediate suspension
without notice of any server on which would prop
dared to or without charge, an open service
to
Public Proxy, IRC, VPN, TOR, where OVH aur
is aware of misuse,
fraudulent or unlawful
ARTICLE 9: MITIGATION (PROTECTION DOS ATTACKS AND DDOS)
OVH is implementing a protection against computer attacks DOS and DDOS (Denial of Service) and provided they are made in a massive way. This feature is intended to allow the continued operation of the Customer Service for the duration of the attack.
This feature is to check the traffic to the Customer Service and from outside the OVH network. The illegitimate qualified traffic is rejected upstream infrastructure Client, allowing legitimate users can access by Customer despite the cyberattack applications.
These safeguards can not intervene for computer attacks such qu'injection SQL Bruteforce, exploitation of security vulnerabilities etc. ...
Due to the great complexity Protection Service, OVH is not subject to an obligation of means, it is possible that the attack is not detected by the tools in place, and the tools developed do not allow the continued operation of the Service.
Depending on the nature of the attack and its complexity, OVH proceed at different levels of traffic protection to preserve its infrastructure and Customer Service.
Mitigation is activated only after the detection of the attack by OVH tools, and a minimum of 26 hours. Therefore until the activation of mitigation, the Department supports the attack frontally which can lead his unavailability.
Since the cyber attack is identified and mitigation is automatically activated, mitigation can not be disabled until the end of the period of 26 hours.
Throughout the duration of the activation of mitigation, OVH can not guarantee the accessibility client applications but will seek to limit the impact of this attack on Customer's Service and Infrastructure OVH.
If, despite the activation of mitigation, the cyber attack is likely to undermine the integrity of the infrastructure or other OVH OVH customers, OVH strengthen protective measures which may cause degradation of the Customer Service or impact availability.
Finally, it is possible that some of the data generated by the attack can not be detected by the equipment OVH and reach Customer Service traffic. The effectiveness of mitigation also depends on the configuration of the Customer's Service, as such it is up to them to verify that they have the necessary skills to ensure proper administration.
To recap, the mitigation does not exempt the Client to proceed with securing its Service, to implement security tools (firewalls ...), to regularly update its system backup its data, or to ensure the security of its computer programs (scripts, codes, etc ...).
Mitigation Option with PRO
If the customer has the use of its service pro option, new features are available.
Customer can activate and advance the mitigation of the Service, however, OVH reminds the activation of mitigation can have a direct impact on the quality of its service. Therefore, the use of mitigation must be done knowingly.
The customer can test whenever they want different protection profiles to measure the impact on the service, and so find the protection profile is best suited to this type of service on the Service. Chosen by the customer profile will be automatically used by OVH in the activation of mitigation.
The Customer may also purchase a firewall that will occur directly along the OVH network.
By default, when mitigation will be activated on the Service Client, Firewall rules are automatically applied. It is the Customer to ensure the relevance of the rules which integrates the firewall, so as not to penalize the activity during the activation of mitigation.