On 2014-02-12 14:43, Terje Mathisen wrote:
David Woolley wrote:
In this article, which also appeared in the paper version this
morning, they suggest that normal NTP time requests result in a much
larger response than the request.
http://metro.co.uk/2014/02/11/the-start-of-ugly-things-to-come-hackers-flood-european-servers-in-biggest-computer-attack-of-its-kind-4300395/
There was no comment section for that article and no documented way to reach
the author so I gave up on sending in a correction. :-(
US-CERT warning on Jan 14 plus 19 current hits on:
https://news.google.ca/news?q=NTP+attack+DDOS+OR+reflection+OR+amplification&oq=NTP+attack+DDOS+OR+reflection+OR+amplification&hl=en&tbm=nws
--
Take care. Thanks, Brian Inglis
_______________________________________________
questions mailing list
[email protected]
http://lists.ntp.org/listinfo/questions