ddos attack blog
Paul Ferguson
fergdawgster at mykolab.com
Thu Feb 13 17:30:06 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
On 2/13/2014 9:06 AM, Cb B wrote:
> Good write up, includes name and shame for AT&T Wireless, IIJ,
> OVH, DTAG and others
>
> http://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack
>
> Standard plug for http://openntpproject.org/ and
> http://openresolverproject.org/ and bcp38 , please fix/help.
>
> For those of you paying attention to the outage list, this is a
> pretty big deal that has had daily ramification for some very big
> networks
> https://puck.nether.net/pipermail/outages/2014-February/date.html
>
> In general, i think UDP is doomed to be blocked and rate limited
> -- tragedy of the commons. But, it would be nice if folks would
> just fix the root of the issue so the rest of us don't have go
> there...
>
The alternative is get people to understand that anti-spoofing is
good, and efforts to combat spoofing should be encouraged.
- - ferg
- --
Paul Ferguson
VP Threat Intelligence, IID
PGP Public Key ID: 0x54DC85B2
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iF4EAREIAAYFAlL9AR4ACgkQKJasdVTchbJZYwEAivI00Yq7RSMze74GFQKEyCeH
pS2s8TH0ba08NWKC22AA/jyN35xonJBzldJA8/xlzhnuLnyOFB0Y7GKZ8NiqRiRl
=ItxR
-----END PGP SIGNATURE-----
More information about the NANOG
mailing list