[180128] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [SECURITY] Application layer attacks/DDoS attacks

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Tue May 26 01:22:10 2015

X-Original-To: nanog@nanog.org
From: "Roland Dobbins" <rdobbins@arbor.net>
To: "North American Network Operators' Group" <nanog@nanog.org>
Date: Tue, 26 May 2015 12:19:58 +0700
In-Reply-To: <m2vbfg9wl7.wl%randy@psg.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On 26 May 2015, at 4:27, Randy Bush wrote:

> may i remind you of the dns query flood i had which you helped 
> research?
> udp and tcp, from the same sources.

Yes - we determined that the TCP-based queries were a result of RRL, 
which is optimized to help with spoofed   reflection/amplification 
attacks, but isn't intended to handle non-spoofed query-floods (hence 
S/RTBH, flowspec, IDMS, et. al.) like the particular ANY query-flood 
directed at your auths.

-----------------------------------
Roland Dobbins <rdobbins@arbor.net>

home help back first fref pref prev next nref lref last post