Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread Ca By
On Saturday, September 24, 2016, Justin Paine via NANOG wrote: > > DNS Results for query A krebsonsecurity.comAnswer:krebsonsecurity.com 157 > IN A 130.211.45.45 > > On Google now. > > Next question. Will google use the information from the telemetry, rumored to be webcams, to

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread Jay Farrell via NANOG
And of course on windows ipconfig /flushdns Still I had to wait for my corporate caching servers to update; I think the TTL on the old A record was an hour. On Sat, Sep 24, 2016 at 9:51 PM, Jared Mauch wrote: > > > On Sep 24, 2016, at 9:28 PM, Justin Paine via NANOG

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread Jared Mauch
> On Sep 24, 2016, at 9:28 PM, Justin Paine via NANOG wrote: > > > DNS Results for query A krebsonsecurity.comAnswer:krebsonsecurity.com 157 IN > A 130.211.45.45 I recommend running this command (or similar): rndc flushname krebsonsecurity.com if you still see 127.0.0.1

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread Justin Paine via NANOG
DNS Results for query A krebsonsecurity.comAnswer:krebsonsecurity.com 157 IN A 130.211.45.45 On Google now.  Justin Paine Head of Trust & Safety CloudFlare Inc. PGP: BBAA 6BCE 3305 7FD6 6452 711557B6 0114 DE0B 314D On Sat, Sep 24, 2016 at 2:17 PM -0700, "Brett Watson"

One Year On: IPv4 Exhaust

2016-09-24 Thread Jay R. Ashworth
One year ago today, at 12:36pm EDT, Facebook On This Day reminds me, John Curran announced that the last IPv4 address block in ARIN's Free Pool had been assigned. How's that been workin' out for everyone? Cheers, -- jra -- Jay R. Ashworth Baylink

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread Brett Watson
>> > that's not the one I was thinking of, this is: > > > which references your presentation, nice! and is about J-root, not K-root, > but mentions Lorenzo's work on K-root studies... In anycase, both seem to > say that 'tcp

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread Christopher Morrow
On Sat, Sep 24, 2016 at 2:43 PM, Niels Bakker

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread Niels Bakker
* morrowc.li...@gmail.com (Christopher Morrow) [Sat 24 Sep 2016, 18:55 CEST]: boy, it'd sure be nice if there were some 'science' and 'measurement' behind such statements. Didn't k-root do some anycast studies ~8-10 years back? Not k-root but CacheFly 2006:

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread Christopher Morrow
On Sat, Sep 24, 2016 at 12:28 PM, Bill Woodcock wrote: > > > On Sep 24, 2016, at 7:47 AM, John Levine wrote: > > > >>> Well...by anycast, I meant BGP anycast, spreading the "target" > >>> geographically to a dozen or more well connected/peered origins. At > that

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread Bill Woodcock
> On Sep 24, 2016, at 7:47 AM, John Levine wrote: > >>> Well...by anycast, I meant BGP anycast, spreading the "target" >>> geographically to a dozen or more well connected/peered origins. At that >>> point, your ~600G DDoS might only be around >> >> anycast and tcp? the heck

Re: Krebs on Security booted off Akamai network after DDoS attack proves pricey

2016-09-24 Thread John Levine
>> Well...by anycast, I meant BGP anycast, spreading the "target" >> geographically to a dozen or more well connected/peered origins. At that >> point, your ~600G DDoS might only be around > >anycast and tcp? the heck you say! :) People who've tried it say it works fine. Routes don't flap that