http://arstechnica.com/security/2014/01/dos-attacks-that-took-down-big-game-sites-abused-webs-time-synch-protocol/
Interesting.. throw requests at an NTP server that look as if they come from the target, prompting large responses to the victim, presumably to overload it.
The article talks about how the victim site can easily filter out the messages from the NTP server, but does not seem to discuss the "societal" impact of potentially screwing up a public service (the NTP server)
_______________________________________________ time-nuts mailing list -- [email protected] To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts and follow the instructions there.
