[169436] in North American Network Operators' Group
Re: Filter NTP traffic by packet size?
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Wed Feb 26 17:35:47 2014
To: Brandon Galbraith <brandon.galbraith@gmail.com>
In-Reply-To: Your message of "Wed, 26 Feb 2014 11:44:55 -0600."
<CADE4tYXj30DeXS2-Jr1m87JGTB=xTbYVZTje-RvtWoB903jcPA@mail.gmail.com>
From: Valdis.Kletnieks@vt.edu
Date: Wed, 26 Feb 2014 17:33:45 -0500
Cc: "nanog@nanog.org" <nanog@nanog.org>, Keegan Holley <no.spam@comcast.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
--==_Exmh_1393454025_1571P
Content-Type: text/plain; charset=us-ascii
On Wed, 26 Feb 2014 11:44:55 -0600, Brandon Galbraith said:
> Blocking chargen at the edge doesn't seem to be outside of the realm of
> possibilities.
What systems are (a) still have chargen enabled and (b) common enough to make
it a viable DDoS vector? Just wondering if I need to go around and find
users of mine that need to be smacked around with a large trout....
--==_Exmh_1393454025_1571P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Exmh version 2.5 07/13/2001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=oKHl
-----END PGP SIGNATURE-----
--==_Exmh_1393454025_1571P--