Log In Failure: Now Resolved

Blizzard’s log in servers have been unavailable for most of the day, despite numerous Blue Posts updating the issue and working towards a fix. Log In Failure: Now Resolved.

The connection issues reported earlier appear to have been resolved. Thanks to everyone for being patient with us while we looked into and addressed your reports. As ever, we will continue to monitor the status of our games and incoming reports from our players.

If you ever have difficulty accessing our sites during a service outage, please don’t hesitate to reach out to our Customer Support team via Twitter or by submitting a Customer Support ticket:

  • @BlizzardCS (Twitter)
  • Customer Support Page
  • There was a lot of speculation that the downtime was due to a DDoS attack, but a Blue Post stated that was *not* the case. Ironically, I’d just read an article on Kotaku about how DDoS attacks have evolved in recent years and why they are so difficult to deal with these days. It’s an informative and depressing read.

    Last week, eager Christmas celebrators across the world hooked up their brand new Xboxes and PlayStations only to find that both online networks were down, leaving countless new games totally unplayable.

    It was a particularly large piece of coal in gamers’ stockings, and while Microsoft’s service recovered after 24 hours, the PlayStation Network suffered a prolonged outage that lasted two full days. Even today we’re still feeling the effects; almost a week later, PSN’s service remains intermittent thanks to what Sony said this weekend was a Distributed Denial of Service (DDoS) attack—an intentional flood of traffic designed to cripple a network’s servers.

    …these attacks have grown increasingly sophisticated over the past few months, to the point where security methods installed as recently as 2012 or 2013 might no longer be effective.

    “One of the historical ways that people have handled these attacks is they notice that the spike is occurring against them and they’re seeing an outage, and then they work with their providers to do something called ‘blackholing,'” Larson said. “Meaning as they’re sending [fake traffic] you just wanna throw it into the ground, you wanna throw it away.

    “A year and a half ago, DDoS attacks were the kind of things that happened against you—you noticed there was a DDoS attack, and then you blackholed and moved on. The tools are much more dynamic now. Humans and human processes are not fast enough to keep up with the change — you need a machine system that’s basically looking for and identifying the attacks in real time, then taking action against them immediately.”

    It’s a sad state when some geek group with a grievance, or just some bored script kiddies, can ruin everyone else’s gaming fun for hours or days. But that seems to be the world we live in, as cyber security and maintenance is forever trying to keep up with the people figuring out ways to break the system. Throw that on top of just general technical issues and human stupidity, and it’s a wonder we can even check our email with any reliability.

    Click through for some more Blue posts about today’s log in downtime.

    Good morning, everyone!

    We’re aware that many players are experiencing issues both logging into and staying connected to several of our games, including Diablo III.

    While we don’t have an ETA to share at this time for when login and connectivity will be restored, we’re working to address the issues presently and will provide further updates as more information becomes available. You can follow this thread for those updates or check out our @BlizzardCS Twitter feed.

    We sincerely apologize for any inconvenience this service interruption has caused, and would like to thank you so much for your patience (and your reports). We hope to have our service restored and running smoothly just as quickly as possible.


    [UPDATE] 11:55 a.m. PST: At this time we are currently hoping to have login and connectivity restored for both and Diablo III in approximately 90 minutes. Please note that this just an estimate, however, and that these issues may take longer to resolve.

    As always, should this estimate change, and should these issues persist after that time frame has expired, we will post an update to this thread. We will also be sure to provide an update once all issues are resolved.


    [UPDATE] 1:49 p.m. PST: We’re continuing to work to address issues affecting login, connectivity, and long game queues. We don’t have a new ETA to share at this time regarding when these issues will be resolved, but we’ll continue to provide updates in this thread as new information become available.

    Thank you to everyone for being so patient. We hope to have you all back into and playing your game of choice as soon as possible!


    [UPDATE] 4:10 p.m. PST: The connection issues reported earlier appear to have been resolved. Thanks to everyone for being patient with us while we looked into and addressed your reports. As ever, we will continue to monitor the status of our games and incoming reports from our players.

    And more info….

    Velnrak: 10:06 am

    Our current Estimate for a resolution is 90 minutes. Thanks again for your patience.

    Hello Everyone, we’re looking into the Error 3006 issues. I’ll post updates as I get them. Thanks for your patience!

    12 Noon

    We’ve identified the issue, and it should be resolved in an hour.

    We can say that this was not a DDoS attack, and it was an issue on our side.

    1 pm

    We’re continuing to work on this issue, and we’ll provide updates as we get them.

    Update 3:28 pm has been restored, and you should be able to login once again. Thanks very much for your patience today.

    Annoying for people who missed a day or an afternoon of play time, but it goes to show why Bliz didn’t want to go live with the patch now on the PTR back before Xmas. It was content complete, but with the holiday coming up and heavier player use expected, they didn’t want to risk it without all their tech guys present in case of emergency. Like the one they had today.

    Tagged As: | Categories:, Blue Posts, Hardware & Tech


    You're not logged in. Register or login to post a comment.
    1. Man, between rouge nations and hackers, Sony has really been getting kicked in the junk lately!

      My question is at what point do these incredibly wealthy companies start protecting thier networks with same level of expertise that hacks them?

      Until then it's just train wreck city one after another……

      • That's the problem, the pendulum swings both ways, and currently it's easier to "hack" than it is to protect. It's like we use wooden doors to protect ourselves, and the hackers have a nice metal axe to chop them down with. When the pendulum swings next, we'll have metal doors and the metal axe will still get the job done in some cases, but most hackers will vanish until one of them gets a light saber, and then the pendulum swings the other way again… Really though, the problem is there's too much reliance on the net these days with all these clouds, and pods and craps. I just bought a PS3 finally this Christmas, played a bunch of red box 'greatest hit' games and never even knew about the Sony hack. D3 is the only Online Only game I will ever play/buy, I never buy online only because the internet is just too unreliable.

        • unfortunately it seems most new games require a check in. Myself, I use my PS3 mostly for netflix/amazon. I couldn't do that as even those apps require the PSN network to be logged in. Luckily I have pc's. I won't be buying a PS4 or xboxone. I tried that and just don't enjoy it as much as PC gaming.

      • Many many security experts really don't think it was North Korea that hacked Sony and I'm leaning towards agreeing with them. There are far more plausible scenarios and one security company that investigated the matter found evidence that it was at least one former employee.

        The code used to hack Sony is not exactly secret. The first thing the hackers did was try to extort money from Sony. When the whole suggestion of North Korea came out, they latched onto it and said ya thats why we did it and let the media run with it.

        There have been far worse things said and done that would offend North Korea and yet they never acted on it. It just doesn't make any sense.

    2. While it is indeed sad to see people's gaming experiences ruined by acts of sabotage like these, it's a calculated risk that publishers willingly took and apparently will unswervingly continue to take: In times when even the most basic single-player games 'require' a permanent online connection, solely for the publisher's benefits from digital distribution, DRM and blasted 'perpetual beta' developement, customer satisfaction just doesn't seem to be such a high priority anymore.

    3. I run around 150 web sites, all of them wordpress based which is very popular. As such, its a prime target for hackers. My servers are under constant attacks from bot nets trying to brute force passwords and such. They have gotten quite complex. The number of compromised personal computers and servers out there is staggering. And thats what makes up these bot nets. You can't just block one attacker any more as they set these bot nets to never attack from the same pc/server more than 2 or 3 times before the software tells the next machine to try.

      Occasionally we get script kiddies who hammer a server from a single ip. They are VERY easy to block and we have automated systems in place to stop that very quickly. These are the noobs though.

      What needs to happen is a coordinated effort to rid the internet of compromised machines. Starting with servers. Hosting companies need to be held accountable for compromised machines on their networks. I have around 6 servers that I manage and if any one of them was compromised, I'd want to know about it and I'd want it quarantined until I could remove the hack. I would completely accept that as a terms of service and it would actually be beneficial to me.

      As it is now, most hosting companies have an abuse department. I have submitted many reports but have never heard back from any hosting company in regards to the machines I report as having been involved in an attack on my server. It got to a point where I don't even bother.

      It's just a matter of wanting to actually address the issue. I think at the moment, each of us that manage servers just feel helpless and that there is nothing we can really do about it. It's currently the cost of doing business online. But its getting more expensive to fight it. With the Sony attack and the XMAS DDOS attack, we may see Congress address the issue with legislation. We'll see.

      • Only internet legislation congress cares about is taxing your Amazon & e-Bay purchases. Going to tin foil hat about something other than D3 for once, & say the government probably wants the internet to become unstable. They won't pass any legislation to clean things up until it reaches critical mass & becomes unuseable, or some kind of catastrophic fraud occurs. Then they'll take the usual knee jerk reaction & pass the internet version of the Patriot Act & hand control of it to the NSA or something, who are probably themselves responsible for a great number of the worms and Trojans found on systems in the first place.

        Every government in the world hates the idea of a completely free internet, that is the free, uncensored transmission of data, the 'free' nations are no exception. They see what the net can do even in countries like Egypt & Iran, & they lose sleep over it, wondering how they can protect themselves if something similar happened to them.

    4. A DDoS capable of taking out gaming servers is well beyond the capability of a script kiddie these days.

      Think: criminal botnets, spread by malware.

    Comments are closed.