Re: FlowSpec

2020-04-23 Thread Roland Dobbins
with Customer B's traffic, and the difficulty of implementing such constraints). It can be an option worth exploring, in many circumstances. Roland Dobbins

Re: UDP/123 policers & status

2020-03-28 Thread Roland Dobbins
rstood and -documented, and a bit of research can help bring one up to speed on them pretty quickly. ---- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-09-01 Thread Roland Dobbins
-address validation (SAV). Without the ability to spoof, there would be no reflection/amplification attacks. --- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-09-01 Thread Roland Dobbins
int is that when applying broad policies of this nature, one must be very conservative, else one can cause larger problems on a macro scale. Internet ateriosclerosis is a significant issue. --- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-09-01 Thread Roland Dobbins
control. * btw, what can you experts tell me about tcp-based volumetric attacks... TCP reflection/amplification. --- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-31 Thread Roland Dobbins
-appropriate manner. And when we're using techniques like QoSing down certain ports/protocols, we must err on the side of caution, lest we cause larger problems than the attacks themselves. --- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-31 Thread Roland Dobbins
ng_Isp_v2.pdf> ------- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-31 Thread Roland Dobbins
. --- Roland Dobbins

Re: automatic rtbh trigger using flow data

2018-08-30 Thread Roland Dobbins
xge> --- Roland Dobbins

Re: tcp md5 bgp attacks?

2018-08-14 Thread Roland Dobbins
. --- Roland Dobbins

Re: tcp md5 bgp attacks?

2018-08-14 Thread Roland Dobbins
On 15 Aug 2018, at 6:28, Grant Taylor via NANOG wrote: > Is there something that I've missed the boat on? No - it's a belt-and-suspenders sort of thing, along with GTSM. --- Roland Dobbins

Re: SP security knowledge build up

2018-07-23 Thread Roland Dobbins
echnology-ebook/dp/B0051TM5L2/> --- Roland Dobbins

Re: Attacks on BGP Routing Ranges

2018-04-18 Thread Roland Dobbins
infrastructure self-protection concepts: <https://app.box.com/s/osk4po8ietn1zrjjmn8b> --- Roland Dobbins <rdobb...@arbor.net>

Re: New Active Exploit: memcached on port 11211 UDP & TCP being exploited for reflection attacks

2018-02-27 Thread Roland Dobbins
licies at the IDC edge which disallow unwanted UDP/11211 as well as TCP/11211 from reaching abusable memcached deployments. --- Roland Dobbins <rdobb...@arbor.net>

Re: BCP38/84 and DDoS ACLs

2017-05-26 Thread Roland Dobbins
On 27 May 2017, at 0:19, Roland Dobbins wrote: > <https://app.box.com/s/ko8lk4vlh1835p36na3u> This is the correct URI for the first preso, apologies: <https://app.box.com/s/osk4po8ietn1zrjjmn8b> ------- Roland Dobbins <rdobb...@arbor.net>

Re: BCP38/84 and DDoS ACLs

2017-05-26 Thread Roland Dobbins
On 27 May 2017, at 0:54, valdis.kletni...@vt.edu wrote: > I'll go out on a limb and suggest that except for a very basic home/SOHO > network, "You may need" should be "You will probably need". Concur, heh. ----------- Roland Dobbins <rdobb...@arbor.net>

Re: BCP38/84 and DDoS ACLs

2017-05-26 Thread Roland Dobbins
You may need one set of ACLs at the peering/transit edge, and other, more specific ACLs, at the IDC distribution gateway, customer aggregation gateway, et. al. --- Roland Dobbins <rdobb...@arbor.net>

Re: Consumer networking head scratcher

2017-03-01 Thread Roland Dobbins
IRC. --- Roland Dobbins <rdobb...@arbor.net>

Re: Software for network modelling / documentation / GIS

2017-02-23 Thread Roland Dobbins
of capability, too. --- Roland Dobbins <rdobb...@arbor.net>

Re: Distributed Object Architecture versus DNS

2017-01-06 Thread Roland Dobbins
On 7 Jan 2017, at 14:22, Joly MacFie wrote: > Blind backlash from IoT DDoS? Looming billions of rf tagged items​? None of this has anything to do with this 'DOA' thing, though. --- Roland Dobbins <rdobb...@arbor.net>

Re: Distributed Object Architecture versus DNS

2017-01-06 Thread Roland Dobbins
of this nature, I've been waiting for the ITU to impose GOSIP or whatever on us for the last ~30 years or so - but so far, nothing much has happened in that regard. Is there actually a reason to suspect that this time it will be any different? --- Roland Dobbins <rd

Re: Distributed Object Architecture versus DNS

2017-01-06 Thread Roland Dobbins
, per se. Can you provide more context? --- Roland Dobbins <rdobb...@arbor.net>

Re: [Tier1 ISP] : Vulnerable to a new DDoS amplification attack

2016-12-22 Thread Roland Dobbins
tl-expiry-attack.html> ------- Roland Dobbins <rdobb...@arbor.net>

Re: [Tier1 ISP] : Vulnerable to a new DDoS amplification attack

2016-12-22 Thread Roland Dobbins
On 22 Dec 2016, at 20:27, Jean | ddostest.me via NANOG wrote: the already known Layer 4 amp DDoS like dns, ntp, ssdp, snmp These are layer-7 reflection/amplification attacks - i.e., application-layer - *not* layer-4. --- Roland Dobbins <rdobb...@arbor.net>

Re: Recent NTP pool traffic increase

2016-12-20 Thread Roland Dobbins
On 20 Dec 2016, at 12:18, Laurent Dumont wrote: > As a student in the field, this is the kind of stuff I live for! ;) <https://en.wikipedia.org/wiki/NTP_server_misuse_and_abuse#Notable_cases> ------- Roland Dobbins <rdobb...@arbor.net>

Re: Prepending with another ASN you don't own

2016-12-16 Thread Roland Dobbins
On 17 Dec 2016, at 0:13, Job Snijders wrote: There are providers who inspect the AS_PATH's contents and make decisions to reject (ignore) a route announcement or not based on the presence of certain values. +1 --- Roland Dobbins <rdobb...@arbor.net>

Re: Recent NTP pool traffic increase

2016-12-16 Thread Roland Dobbins
On 16 Dec 2016, at 16:40, Roland Dobbins wrote: Looking at the source IP distribution, does a significant proportion of the larger query base seem to originate out-of-region? And are do they appear to be mostly broadband access networks

Re: Recent NTP pool traffic increase

2016-12-16 Thread Roland Dobbins
? --- Roland Dobbins <rdobb...@arbor.net>

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
On 16 Dec 2016, at 10:17, Roland Dobbins wrote: <http://pages.cs.wisc.edu/~plonka/netgear-sntp/> Over on nznog, Cameron Bradley posited that this may be related to a TR-069/-064 Mirai variant, which makes use of a 'SetNTPServers' exploit. Perhaps one of them is actually s

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
On 16 Dec 2016, at 10:16, Roland Dobbins wrote: > <http://pages.cs.wisc.edu/~plonka/netgear-sntp/> ------- Roland Dobbins <rdobb...@arbor.net>

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
On 16 Dec 2016, at 10:09, Dan Drown wrote: This seems more like "someone pushed out bad firmware" rather than something malicious. Everything old is new again . . . ------- Roland Dobbins <rdobb...@arbor.net>

Re: Recent NTP pool traffic increase

2016-12-15 Thread Roland Dobbins
queries, or lots of level-6/level-7 admin command attempts? --- Roland Dobbins <rdobb...@arbor.net>

Re: Favorite Speed Test Systems

2016-12-05 Thread Roland Dobbins
On 5 Dec 2016, at 21:50, Graham Johnston wrote: What is your preferred one and why? <http://testmy.net/> Thorough, reasonable teat methodology, allows one to store history, decent range of test servers worldwide. --- Roland Dobbins <rdobb...@arbor.net>

Re:

2016-12-02 Thread Roland Dobbins
On 2 Dec 2016, at 22:31, Christopher Morrow wrote: > that statement seems ... hard to prove. Paging Geoff Huston to the white courtesy phone . . . ;> --- Roland Dobbins <rdobb...@arbor.net>

Re: Spitballing IoT Security

2016-12-02 Thread Roland Dobbins
nternet' is equally uninformed. State actors already know how to do this, they don't need to 'learn' or 'test' anything. DDoS attacks are the Great Equalizer; when it comes to DDoS, nation-states are just another player. ------- Roland Dobbins <rdobb...@arbor.net>

Re: How to find all of an ISP's ASNs

2016-10-25 Thread Roland Dobbins
On 26 Oct 2016, at 0:41, Gary Baribault wrote: > other than the two local major ISPs (keeping last Friday in mind!) . . . why would you want to expose them to the public Internet at all? There are many, many reasons not to do so. --- Roland Dobbins <

Re: Dyn DDoS this AM?

2016-10-21 Thread Roland Dobbins
On 21 Oct 2016, at 23:01, Mike Hammett wrote: > Are there sites that can test your BCP38\84 compliance? <https://www.caida.org/projects/spoofer/> ------- Roland Dobbins <rdobb...@arbor.net>

Re: MPLS in the campus Network?

2016-10-20 Thread Roland Dobbins
On 20 Oct 2016, at 23:32, Mark Tinka wrote: Some requirements call for Ethernet transport as opposed to IP. Sure - but it's probably worth revisiting the origins of those requirements, and whether there are better alternatives. --- Roland Dobbins <rd

Re: MPLS in the campus Network?

2016-10-20 Thread Roland Dobbins
. --- Roland Dobbins <rdobb...@arbor.net>

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
On 28 Sep 2016, at 0:18, Brielle Bruns wrote: > I call shenanigans on providers not seeing their unruly users. I was talking about the users, not the ISPs. --- Roland Dobbins <rdobb...@arbor.net>

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
, however. Especially the Internet part. ;> --- Roland Dobbins <rdobb...@arbor.net>

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
* the unruly children, but *choose* to ignore them. That's the difference. Keep in mind, most of the folks on this list are not representative of the average consumer in terms of the skill-sets which are relevant in this problem space. --- Roland Dobbins <rd

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
On 27 Sep 2016, at 22:37, Patrick W. Gilmore wrote: All the more reason to educate people TODAY on why having vulnerable devices is a Very Bad Idea. Yes, but how do they determine that a given device is vulnerable? --- Roland Dobbins <rdobb...@arbor.net>

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
provider, just as they typically do for electricity and water. --- Roland Dobbins <rdobb...@arbor.net>

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-27 Thread Roland Dobbins
they own, every can of soda in their refrigerator, ever major (and many minor) components of their automobiles, every blade in their windowshades, etc. --- Roland Dobbins <rdobb...@arbor.net>

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
ilar would work here. Concur that this is the least-improbable model, absolutely. But keep in mind that subscriptions/services for in-home wiring were (and are) also a tiny percentage of the user base. ------- Roland Dobbins <rdobb...@arbor.net>

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
ship them a pre provisioned dongle). The number of people capable of doing this troubleshooting for themselves is roughly equivalent to the number of people who've successfully set up 2FA on their own initiative. --- Roland Dobbins <rdobb...@arbor.net>

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
user troubleshooting, as well. --- Roland Dobbins <rdobb...@arbor.net>

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-26 Thread Roland Dobbins
in the public mind of 'my network' from 'the Internet' that is analogous to the separation between 'the power company' and 'the electrical wiring in my house/apartment' (and even in that space, the conceptual separation often isn't present). --- Roland Dobbins <rd

Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-21 Thread Roland Dobbins
.gifs or something, surely this might be possible, yes? It seems within the realm of possibility this sort of response - or lack thereof - could result in some gaming network operators becoming a bit jaded. And perhaps some customers, too. --- Roland Dobbins

Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-16 Thread Roland Dobbins
of engagement of clueful folks in the global operational community. Some gaming-oriented networks are well-represented; others are not, sadly. --- Roland Dobbins <rdobb...@arbor.net>

Re: PlayStationNetwork blocking of CGNAT public addresses

2016-09-16 Thread Roland Dobbins
; as CGN becomes more prevalent on wireline broadband networks, it's only going to get worse. AFAIK, PSN doesn't support IPv6. That would be another topic of discussion with the operational folks. --- Roland Dobbins <rdobb...@arbor.net>

Re: EVERYTHING about Booters (and CloudFlare)

2016-07-29 Thread Roland Dobbins
they can be enforced. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thinking Methodically about building a PoC

2016-06-12 Thread Roland Dobbins
On 13 Jun 2016, at 8:52, Kasper Adel wrote: > 2) Do some planning and research first. This. --- Roland Dobbins <rdobb...@arbor.net>

Re: AW: AW: Verizon and Level3 DNS flush

2016-06-02 Thread Roland Dobbins
he cache-flushing challenges you're now experiencing. Sometimes it isn't possible, of course. ------- Roland Dobbins <rdobb...@arbor.net>

Re: AW: Verizon and Level3 DNS flush

2016-06-02 Thread Roland Dobbins
th addressing seldom, if ever, accomplishes anything useful in terms of successfully defending against DDoS attacks. ------- Roland Dobbins <rdobb...@arbor.net>

Re: Turning Off IPv6 for Good (was Re: Netflix VPN detection - actual engineer needed)

2016-06-01 Thread Roland Dobbins
their ISPs? ;> --- Roland Dobbins <rdobb...@arbor.net>

Re: NIST NTP servers

2016-05-10 Thread Roland Dobbins
ing-Opensourcely-wp.pdf> Just keep in mind, *nothing* is perfect. --- Roland Dobbins <rdobb...@arbor.net>

Re: BGP FlowSpec

2016-05-02 Thread Roland Dobbins
and research papers, but rather upon our actions which generate the data and experiential observations upon which such reports and research papers are based. --- Roland Dobbins <rdobb...@arbor.net>

Re: BGP FlowSpec

2016-05-02 Thread Roland Dobbins
d); those espousing it pretty quickly changed their tunes once their networks had been knocked flat a couple of times. ;> ------- Roland Dobbins <rdobb...@arbor.net>

Re: BGP FlowSpec

2016-05-02 Thread Roland Dobbins
rapidity of response, and interoperability in both inter- and intra-network DDoS mitigation scenarios. --- Roland Dobbins <rdobb...@arbor.net>

Re: BGP FlowSpec

2016-04-30 Thread Roland Dobbins
On 30 Apr 2016, at 19:56, Pierre Lamy wrote: > to null out the destination rather than the source. <https://tools.ietf.org/html/rfc5635> ------- Roland Dobbins <rdobb...@arbor.net>

Re: Why the US Government has so many data centers

2016-03-12 Thread Roland Dobbins
On 13 Mar 2016, at 3:03, George Herbert wrote: > It's a symptom of trying to save a few cents at the risk of dollars. Concur 100%. Not to mention the related security issues. --- Roland Dobbins <rdobb...@arbor.net>

Re: Why the US Government has so many data centers

2016-03-11 Thread Roland Dobbins
lying around in random rooms, and that those rooms are de facto government data centers, whether those who're responsible for said rooms/servers know it or not . . . --- Roland Dobbins <rdobb...@arbor.net>

Re: sFlow vs netFlow/IPFIX

2016-02-29 Thread Roland Dobbins
spamming the list. ------- Roland Dobbins <rdobb...@arbor.net>

Re: sFlow vs netFlow/IPFIX

2016-02-29 Thread Roland Dobbins
es. I really like to hear feedback about my vision. See above. ------- Roland Dobbins <rdobb...@arbor.net>

Re: sFlow vs netFlow/IPFIX

2016-02-29 Thread Roland Dobbins
NetFlow implementations (with the exceptions of crippled implementations like the aforementioned EARL6/EARL7 and pre-Sup7 Cisco 4500) are simply untrue. --- Roland Dobbins <rdobb...@arbor.net>

Re: sFlow vs netFlow/IPFIX

2016-02-28 Thread Roland Dobbins
. This is incorrect, and reflects an inaccurate understanding of how NetFlow/IPFIX actually works, in practice. It's often repeated by those with little or no operational experience with NetFlow/IPFIX. --- Roland Dobbins <rdobb...@arbor.net>

Re: sFlow vs netFlow/IPFIX

2016-02-28 Thread Roland Dobbins
, anyways. --- Roland Dobbins <rdobb...@arbor.net>

Re: sFlow vs netFlow/IPFIX

2016-02-28 Thread Roland Dobbins
rt 1:1. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 8:06, Keith Medcalf wrote: Consumer Narrowband Access Networks use these protocols all the time. Most broadband access customers do not actively use these protocols, themselves, with the partial exception of SIP. --- Roland Dobbins <rd

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 7:59, John Levine wrote: I think that most if not all of the consumer over the top VoIP phones like Vonage use SIP. That's true. One would hope that they're not globally reachable, however. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 7:23, John Levine wrote: The VoIP phones sure use SIP. True, but how prevalent are 'bare' SIP phones vs. VoIP systems utilized by remote workers via VPNs? --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
On 27 Feb 2016, at 4:03, John Levine wrote: A certain number of us work from home and connect to headquarters with a VPN. and have SIP phones, you know. Not typically via/requiring the protocols you mentioned. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
are what's being discussed in this thread. It's a different story for transit operators. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
. Also, see this article: <http://arstechnica.com/security/2016/02/asus-lawsuit-puts-entire-industry-on-notice-over-shoddy-router-security/> and this .pdf preso: <https://app.box.com/s/rblnddlhda44giwfa8hy> --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
running out-of-date software that is abusable in multiple ways. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
pp.box.com/s/r7an1moswtc7ce58f8gg> ------- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
is often the case). And even that small tenth of a percent who're deliberately running their own DNS servers can end up inadvertently causing disruption if they're running those DNS servers as open recursors. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-26 Thread Roland Dobbins
*destined* for UDP/53 on broadband access networks, not *sourced from*. --- Roland Dobbins <rdobb...@arbor.net>

Re: Thank you, Comcast.

2016-02-25 Thread Roland Dobbins
from broadband access networks due to abusable CPE. Others, as well, of course, but those are generally the most prevalent. --- Roland Dobbins <rdobb...@arbor.net>

Re: UDP Amplification DDoS - Help!

2016-02-08 Thread Roland Dobbins
. --- Roland Dobbins <rdobb...@arbor.net>

Re: UDP Amplification DDoS - Help!

2016-02-08 Thread Roland Dobbins
t from the immediate upstream. --- Roland Dobbins <rdobb...@arbor.net>

Re: Netflix NOC? VPN Mismarked?

2016-01-28 Thread Roland Dobbins
On 29 Jan 2016, at 0:05, Crane, Todd wrote: > Imagine the issues if EoL'ed and EoS'ed those iPads. Um, I think they are . . . --- Roland Dobbins <rdobb...@arbor.net>

Re: Netflix stuffing data on pipe

2015-12-30 Thread Roland Dobbins
, or . . . ? --- Roland Dobbins <rdobb...@arbor.net>

Re: John McAfee: Massive DDoS attack on the internet was from smartphone botnet on popular app

2015-12-12 Thread Roland Dobbins
On 13 Dec 2015, at 0:23, Jim Shankland wrote: Am I missing something, or is an even distribution of originating IP addresses virtually impossible *without* using spoofing? If his remarks were reported correctly, they are incorrect. --- Roland Dobbins <rd

Re: Ransom DDoS attack - need help!

2015-12-09 Thread Roland Dobbins
tps://app.box.com/s/776tkb82634ewvzvp26nnout6v4ij39q> <https://app.box.com/s/r7an1moswtc7ce58f8gg> --- Roland Dobbins <rdobb...@arbor.net>

Re: Ransom DDoS attack - need help!

2015-12-09 Thread Roland Dobbins
, and some preemptive ACLs so that you aren't forced into completing the DDoS. --- Roland Dobbins <rdobb...@arbor.net>

Re: Ransom DDoS attack - need help!

2015-12-08 Thread Roland Dobbins
y-specific. ------- Roland Dobbins <rdobb...@arbor.net>

Re: Questions regarding equipment for a large LAN event

2015-12-06 Thread Roland Dobbins
On 7 Dec 2015, at 13:41, Laurent Dumont wrote: > I appreciate any input on the matter! 1. cisco-nsp is a better list for this type of question. 2. The ASR9K is an edge router, not an access switch. 3. Why not just ask Cisco, for starters? --- Rol

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
Start with the BCPs, then move to the macroanalytical. Only dip into the microanalytical when required, and even then, do so very selectively. --- Roland Dobbins <rdobb...@arbor.net>

Re: Staring Down the Armada Collective

2015-12-03 Thread Roland Dobbins
DDoS attacks, FYI. --- Roland Dobbins <rdobb...@arbor.net>

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
On 3 Dec 2015, at 22:26, Nick Hilliard wrote: > If you believe that someone who issues a ransom threat will stop if you pay > them off, you're smoking crack. +1 These attacks aren't rocket-science to defend against. OP, ping me 1:1. --- Roland Dobbins

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
th the right folks. --- Roland Dobbins <rdobb...@arbor.net>

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
On 3 Dec 2015, at 22:04, Josh Reynolds wrote: > None of those names you just mentioned have made the international news. Of course they have. --- Roland Dobbins <rdobb...@arbor.net>

Re: Ransom DDoS attack - need help!

2015-12-03 Thread Roland Dobbins
On 4 Dec 2015, at 2:38, Dovid Bender wrote: > The last I spoke with NTT they said the largest they ever saw was > 300GB That wasn't DD4BC or Armada Collective. --- Roland Dobbins <rdobb...@arbor.net>

Re: strategies to mitigate DNS amplification attacks in ISP network

2015-12-01 Thread Roland Dobbins
On 2 Dec 2015, at 0:14, Roland Dobbins wrote: Until the happy day when we've achieved universal source-address validation arrives, various combinations of the above. I forgot to mention RRL on authoritative servers, apologies. --- Roland Dobbins <rd

Re: strategies to mitigate DNS amplification attacks in ISP network

2015-12-01 Thread Roland Dobbins
ed out' by programmatically-generated attack traffic). The real solution to this entire problem set is source-address validation, as you indicate. Until the happy day when we've achieved universal source-address validation arrives, various combinations of the above. --- Roland D

  1   2   3   4   5   >