GoDaddy : DDoS : : Contact

A.L.M.Buxey at lboro.ac.uk A.L.M.Buxey at lboro.ac.uk
Mon Aug 3 12:56:18 UTC 2015


Hi,

> What would be the point of spoofing the source IPs to be identical? You're just making the attack trivial to block.  Plus you could never do any kind of TCP session attack, since you can't complete a handshake. I would have to call this sort of attack a LAAADDoS (Lame Attempt At A DDoS). :)

perhaps spoofing an IP that cannot be blocked as its one that needs to be allowed for the site IT to operate? some
cloud service IP or such.... ?

alan



More information about the NANOG mailing list