On Tue, Apr 13, 2010 at 08:27:11AM +0200, Randy R wrote: > On Mon, Apr 12, 2010 at 7:17 PM, Darrick Hartman > <dhart...@djhsolutions.com> wrote: > > That only addresses EC2 (and assumes that Amazon has any interest in > > protecting their reputation). What about attacks that come from other > > locations? Granted it's pretty easy to buy time on an EC2 server so > > this may be the primary source for a period of time. > > With the growth of the cloud offerings, this problem will likely grow, > so yes, a generic solution is needed. What I want to see though, and > no provder has done much if anything about it, is REPORTING and > INVESTIGATION. It is easy to use a script to report and submit, we can > all do that, even I could (if I had a box running and needed to). The > hard part is them having their tech/sys people actually look at the > network and see, "Oh, ya, there's some shit happening that on that > instance..."
But this potentially moved DoS attacks from one place to another. Especially given that the source of a UDP packet is easy to forge. (And yes, in this case the attack was not intended to be a simple DoS) -- Tzafrir Cohen icq#16849755 jabber:tzafrir.co...@xorcom.com +972-50-7952406 mailto:tzafrir.co...@xorcom.com http://www.xorcom.com iax:gu...@local.xorcom.com/tzafrir -- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users