Krebs on Security booted off Akamai network after DDoS attack proves pricey
Ca By
cb.list6 at gmail.com
Sun Sep 25 17:41:12 UTC 2016
On Sunday, September 25, 2016, John Levine <johnl at iecc.com> wrote:
> >> Yeh, bcp38 is not a viable solution.
>
> Krebs said this DDoS came from insecure IoT devices, of which there
> are a kazillion, with the numbers growing every day. Why would they
> need to spoof IPs? How would BCP38 help?
>
> R's,
> John
>
Worth reading to level set
https://www.internetsociety.org/sites/default/files/01_5.pdf
The attack is triggered by a few spoofs somewhere in the world. It is not
feasible to stop this.
The attack traffic that blows up to 600gbs is from traceable iot crap , the
victim knows who is sending the packers (iot crap) and the access network
(comcast, att ...) has the AUP authority to shut it down.
One by one.
Or automated.
Please see https://www.ietf.org/rfc/rfc6561.txt
More information about the NANOG
mailing list