UDP port 80 DDoS attack
steve.bertrand at gmail.com
Sun Feb 5 21:08:19 CST 2012
On 2012.02.05 20:37, Keegan Holley wrote:
> 2012/2/5 Dobbins, Roland<rdobbins at arbor.net>
>> S/RTBH - as opposed to D/RTBH - doesn't kill the patient. Again, suggest
>> you read the preso.
> Source RTBH often falls victim to rapidly changing or spoofed source IP"s.
> It also isn't as widely supported as it should be. I never said DDOS was
> hopeless, there just aren't a wealth of defenses against it.
This is so very easily automated. Even if you don't actually want to
trigger the routes automatically, finding the sources you want to
blackhole is as simple as a monitor port, tcpdump and some basic Perl.
...and as far as this not having been deployed in many ISPs (per your
next message)... their mitigation strategies should be asked up front,
and if they don't have any (or don't know what you speak of), find a new
More information about the NANOG