[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
TWC (AS11351) blocking all NTP?
- Subject: TWC (AS11351) blocking all NTP?
- From: bortzmeyer at nic.fr (Stephane Bortzmeyer)
- Date: Mon, 3 Feb 2014 10:52:29 +0100
- In-reply-to: <CAEmG1=pmcBJAG1-fT2tBi+9C6v2Mcq-HcHkSaxxQjavahHwi+A@mail.gmail.com>
- References: <[email protected]> <[email protected]> <CAD6AjGTYMM8TSfSmFSh96OHxW6-HJWTGQsU=2KBxbOGxjM44pQ@mail.gmail.com> <CAEmG1=pmcBJAG1-fT2tBi+9C6v2Mcq-HcHkSaxxQjavahHwi+A@mail.gmail.com>
On Sun, Feb 02, 2014 at 02:49:49PM -0800,
Matthew Petach <mpetach at netflight.com> wrote
a message of 49 lines which said:
> If NTP responded to a single query with a single equivalently sized
> response, its effectiveness as a DDoS attack would be zero; with
> zero amplification, the volume of attack traffic would be exactly
> equivalent to the volume of spoofed traffic the originator could
> send out in the first place.
It is a bit more complicated. Reflection with amplification is
certainly much less useful for an attacker but it has still some
advantages: the attack traffic coming to the victim's AS will be
distributed differently (entering via different peers), making
tracking the attacker through Netflow/Ipfix more difficult.