[email protected] wrote:
Reflective multiplication attacks are the current vogue.  Send a small DNS 
query with a forged return address to a authoritative server and get a much 
larger reply in turn.

NTP wouldn't be a good target for such an attack because the response is the 
same size as the query.  Could still be used in a reflective attack but it 
wouldn't have the multiplication effect of a reflective DNS attack.
You forget that the reply to some administrative commands is much larger than 
the request.
When these are allowed they can be used for amplification.

However, as seen in actual attacks the DDoS people have already past this 
station.
First, they sent bare SYN packets from spoofed source addresses -> connection 
table overflow.
It was fixed by SYN COOKIES and other measures.
Then they used DNS amplification to generate a lot of traffic.  But this 
traffic is easily filtered
as it is not the traffic a server normally sees (e.g. TCP traffic to port 80 or 
443)

So the method now is to setup complete connections from systems in a botnet, 
connections
that do not only complete at TCP level but also attempt to start application 
transactions.  Like
fetching a webpage, logging in to a "my xxxxxx" page, etc.
This poses more diffcult challenges for the operators.   And it is very easy to 
find the systems
willing to act as the traffic source, given the large number of poorly 
administered home computers.

Rob
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to