[155081] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DDoS using port 0 and 53 (DNS)

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Wed Jul 25 12:40:25 2012

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Wed, 25 Jul 2012 16:39:13 +0000
In-Reply-To: <CADb+6TD6EMN7i9G99hPrhBh2ck-NwRqUuoQ1ubmnsHYN=iXAkg@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Jul 25, 2012, at 9:52 PM, Joel Maslak wrote:

> In addition to the fragments, these packets might also be non-TCP/UDP (IC=
MP, GRE, 6to4 and other IP-IP, etc).

NetFlow will report the correct protocol number.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

	  Luck is the residue of opportunity and design.

		       -- John Milton



home help back first fref pref prev next nref lref last post