> Null routing the source isn't going to stop
Except when doing source based blackholing, see
http://tools.ietf.org/html/draft-kumari-blackhole-urpf-02 section #4
Dave.
Hi,
Please look for proxad.fr <-- Free
Free is an ADSL provider based in France and proxad is a hosting
company (please give a look at the "dig -x" below)
dig -x 88.191.63.28
; <<>> DiG 9.5.0b2 <<>> -x 88.191.63.28
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, stat
>One of my customers, a host at 64.8.105.15, is feeling a "bonus"
>~130kpps from 88.191.63.28. I've null-routed the source, though our
>Engine2 GE cards don't seem to be doing a proper job of that,
>unfortunately. The attack is a solid 300% more pps than our aggregate
>traffic levels.
Null routi
Mikael Abrahamsson wrote:
Do you really call this "little if any information publically visible"?
Nope, I was wrong about that. My search-fu on RIPE isn't up to snuff,
apparently; hence the request for assistance.
pt
Hello,
On Wed, 26 Nov 2008 05:37:59 -0500
Pete Templin <[EMAIL PROTECTED]> wrote:
> One of my customers, a host at 64.8.105.15, is feeling a "bonus"
> ~130kpps from 88.191.63.28. I've null-routed the source, though our
> Engine2 GE cards don't seem to be doing a proper job of that,
> unfortun
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Pete Templin wrote:
> One of my customers, a host at 64.8.105.15, is feeling a "bonus"
> ~130kpps from 88.191.63.28. I've null-routed the source, though our
> Engine2 GE cards don't seem to be doing a proper job of that,
> unfortunately. The attack
On Wed, 26 Nov 2008, Pete Templin wrote:
It's coming in via 6461, but they don't appear to have any ability to
backtrack it. Their only offer is to blackhole the destination until
the attack subsides. BGP tells me the source is in AS 12322, a RIPE AS
that has little if any information public
One of my customers, a host at 64.8.105.15, is feeling a "bonus"
~130kpps from 88.191.63.28. I've null-routed the source, though our
Engine2 GE cards don't seem to be doing a proper job of that,
unfortunately. The attack is a solid 300% more pps than our aggregate
traffic levels.
It's comin
8 matches
Mail list logo