----- Original Message ----

> From: Ralf Hildebrandt <ralf.hildebra...@charite.de>
> To: postfix-users@postfix.org
> Sent: Wed, July 21, 2010 5:00:16 AM
> Subject: Is such an SSL attack possible against Postfix?
> 
> http://blog.fefe.de/?ts=b2b8f9f8
> sorry, it's in german. I'll translate  some bits:
> 
> Sombody went to Torrent trackers and announced  blog.fefe.de:443 as
> Torrent client (for a really popular download I  guess).
> 
> Thus, blog.fefe.de:443 got flooded with torrent-client traffic on  the
> SSL port.
> 
> Port 25 outgoing will be blocked by most ISPs, but let's  assume that's
> not done by all IPS. It would work with the submission  port!
> 

All,

In my opinion the port really doesn't matter.  If the IP is up and fully 
operational and you send enough traffic to it then yes a DDoS is going to 
happen. If the port isn't open it will just say connection refused, but get 
enough traffic to saturate that bandwidth to the server, and the link will go 
down.

So in this instance you would only be able to protect yourself via TCP and UDP 
Flood Protection on your IDS and HIPS systems or other firewall tools.

Thanks,
Daniel Reinhardt
Website: www.cryptodan.com
Email:  crypto...@yahoo.com


      

Reply via email to