UDP port 80 DDoS attack
Steve Bertrand
steve.bertrand at gmail.com
Mon Feb 6 03:08:19 UTC 2012
On 2012.02.05 20:37, Keegan Holley wrote:
> 2012/2/5 Dobbins, Roland<rdobbins at arbor.net>
>> S/RTBH - as opposed to D/RTBH - doesn't kill the patient. Again, suggest
>> you read the preso.
>>
>
> Source RTBH often falls victim to rapidly changing or spoofed source IP"s.
> It also isn't as widely supported as it should be. I never said DDOS was
> hopeless, there just aren't a wealth of defenses against it.
This is so very easily automated. Even if you don't actually want to
trigger the routes automatically, finding the sources you want to
blackhole is as simple as a monitor port, tcpdump and some basic Perl.
...and as far as this not having been deployed in many ISPs (per your
next message)... their mitigation strategies should be asked up front,
and if they don't have any (or don't know what you speak of), find a new
ISP.
Steve
More information about the NANOG
mailing list