ddos attack blog

Paul Ferguson fergdawgster at mykolab.com
Thu Feb 13 17:30:06 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 2/13/2014 9:06 AM, Cb B wrote:

> Good write up, includes name and shame for AT&T Wireless, IIJ,
> OVH, DTAG and others
> 
> http://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack
>
>  Standard plug for http://openntpproject.org/ and 
> http://openresolverproject.org/ and bcp38 , please fix/help.
> 
> For those of you paying attention to the outage list, this is a
> pretty big deal that has had daily ramification for some very big
> networks 
> https://puck.nether.net/pipermail/outages/2014-February/date.html
> 
> In general, i think UDP is doomed to be blocked and rate limited
> -- tragedy of the commons.  But, it would be nice if folks would
> just fix the root of the issue so the rest of us don't have go
> there...
> 

The alternative is get people to understand that anti-spoofing is
good, and efforts to combat spoofing should be encouraged.

- - ferg


- -- 
Paul Ferguson
VP Threat Intelligence, IID
PGP Public Key ID: 0x54DC85B2

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iF4EAREIAAYFAlL9AR4ACgkQKJasdVTchbJZYwEAivI00Yq7RSMze74GFQKEyCeH
pS2s8TH0ba08NWKC22AA/jyN35xonJBzldJA8/xlzhnuLnyOFB0Y7GKZ8NiqRiRl
=ItxR
-----END PGP SIGNATURE-----



More information about the NANOG mailing list