[182856] in North American Network Operators' Group
Re: GoDaddy : DDoS : : Contact
daemon@ATHENA.MIT.EDU (A.L.M.Buxey@lboro.ac.uk)
Mon Aug 3 08:57:16 2015
X-Original-To: nanog@nanog.org
Date: Mon, 3 Aug 2015 12:56:18 +0000
From: A.L.M.Buxey@lboro.ac.uk
To: Mel Beckman <mel@beckman.org>
In-Reply-To: <C5936B5A-552D-4067-8F24-01B1B6909DDD@beckman.org>
Cc: John Levine <johnl@iecc.com>, "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
Hi,
> What would be the point of spoofing the source IPs to be identical? You're just making the attack trivial to block. Plus you could never do any kind of TCP session attack, since you can't complete a handshake. I would have to call this sort of attack a LAAADDoS (Lame Attempt At A DDoS). :)
perhaps spoofing an IP that cannot be blocked as its one that needs to be allowed for the site IT to operate? some
cloud service IP or such.... ?
alan