[168678] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TWC (AS11351) blocking all NTP?

daemon@ATHENA.MIT.EDU (Stephane Bortzmeyer)
Mon Feb 3 04:53:17 2014

Date: Mon, 3 Feb 2014 10:52:29 +0100
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: Matthew Petach <mpetach@netflight.com>
In-Reply-To: <CAEmG1=pmcBJAG1-fT2tBi+9C6v2Mcq-HcHkSaxxQjavahHwi+A@mail.gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Sun, Feb 02, 2014 at 02:49:49PM -0800,
 Matthew Petach <mpetach@netflight.com> wrote 
 a message of 49 lines which said:

> If NTP responded to a single query with a single equivalently sized
> response, its effectiveness as a DDoS attack would be zero; with
> zero amplification, the volume of attack traffic would be exactly
> equivalent to the volume of spoofed traffic the originator could
> send out in the first place.

It is a bit more complicated. Reflection with amplification is
certainly much less useful for an attacker but it has still some
advantages: the attack traffic coming to the victim's AS will be
distributed differently (entering via different peers), making
tracking the attacker through Netflow/Ipfix more difficult.



home help back first fref pref prev next nref lref last post