[169366] in North American Network Operators' Group
Re: The somewhat illegal fix for NTP attacks
daemon@ATHENA.MIT.EDU (Landon)
Fri Feb 21 17:14:09 2014
In-Reply-To: <CAPkb-7AdMQ=Kpy5_BDYOfQF++B0h693a0Jp5YjZ-DXaGtc9wyQ@mail.gmail.com>
From: Landon <landonstewart@gmail.com>
Date: Fri, 21 Feb 2014 14:13:24 -0800
To: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 21 February 2014 14:08, Baldur Norddahl <baldur.norddahl@gmail.com>wrote:
> Hi
>
> The following would probably be illegal so do not actually do this. But
> what if... there are just 4 billion IPv4 addresses. Scanning that
> address-space for open NTP is trivially done in a few hours. Abusing these
> servers for reflection attack is as trivial, hence the problem. How can we
> get the responsible parties to fix their NTP servers?
>
> Answer: DDoS them. With their own service.
>
/me gets some popcorn and waits for the show.
--
Landon Stewart <LandonStewart@Gmail.com>