[169366] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: The somewhat illegal fix for NTP attacks

daemon@ATHENA.MIT.EDU (Landon)
Fri Feb 21 17:14:09 2014

In-Reply-To: <CAPkb-7AdMQ=Kpy5_BDYOfQF++B0h693a0Jp5YjZ-DXaGtc9wyQ@mail.gmail.com>
From: Landon <landonstewart@gmail.com>
Date: Fri, 21 Feb 2014 14:13:24 -0800
To: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 21 February 2014 14:08, Baldur Norddahl <baldur.norddahl@gmail.com>wrote:

> Hi
>
> The following would probably be illegal so do not actually do this. But
> what if... there are just 4 billion IPv4 addresses. Scanning that
> address-space for open NTP is trivially done in a few hours. Abusing these
> servers for reflection attack is as trivial, hence the problem. How can we
> get the responsible parties to fix their NTP servers?
>
> Answer: DDoS them. With their own service.
>

/me gets some popcorn and waits for the show.

-- 
Landon Stewart <LandonStewart@Gmail.com>

home help back first fref pref prev next nref lref last post