ddos attack blog
jschiel at flowtools.net
Fri Feb 14 18:51:21 UTC 2014
On 02/13/2014 06:01 PM, Jared Mauch wrote:
> On Feb 13, 2014, at 1:47 PM, John <jschiel at flowtools.net> wrote:
> UDP won't be blocked. There are some vendors that have their own hidden protocol inside UDP packets to control and communicate with their devices.
> Thinking on it again, maybe blocking UDP isn't all that bad. Would force the vendors to not 'hide' their protocol.
> Be careful what you wish for. I know some people have just blocked all NTP to keep their servers from participating in attacks. This is common in places where they hand off a VM/host to a customer and no longer have access despite it being in their environment.
I was being a bit extreme, I don't expect UDP to be blocked and there
are valid uses for NTP and it needs to pass. Can you imagine the trading
servers not having access to NTP?
The knee jerk reaction to just block NTP is a temporary measure that can
be used while other mitigation steps are implemented.
I kinda hijacked the NTP issue a bit and expanded it to cover the
undocumented uses of device control in UDP. I'll leave that issue for
another day, just wanted to raise awareness if it was not already known.
> I would actually like to ask for those folks to un-block NTP so there is proper data on the number of hosts for those researching this. The right thing to do is reconfigure them. I've seen a good trend line in NTP servers being fixed, and hope we will see more of that in the next few weeks.
> I've seen maybe 100-200 per-ASN reports handed out to network operators. If you want yours, please e-mail ntp-scan at puck.nether.net to obtain it. Put your ASN in the subject line and/or body.
> - Jared (and others like Patrick that presented on the projects behalf).
More information about the NANOG