[182856] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: GoDaddy : DDoS : : Contact

daemon@ATHENA.MIT.EDU (A.L.M.Buxey@lboro.ac.uk)
Mon Aug 3 08:57:16 2015

X-Original-To: nanog@nanog.org
Date: Mon, 3 Aug 2015 12:56:18 +0000
From: A.L.M.Buxey@lboro.ac.uk
To: Mel Beckman <mel@beckman.org>
In-Reply-To: <C5936B5A-552D-4067-8F24-01B1B6909DDD@beckman.org>
Cc: John Levine <johnl@iecc.com>, "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

Hi,

> What would be the point of spoofing the source IPs to be identical? You're just making the attack trivial to block.  Plus you could never do any kind of TCP session attack, since you can't complete a handshake. I would have to call this sort of attack a LAAADDoS (Lame Attempt At A DDoS). :)

perhaps spoofing an IP that cannot be blocked as its one that needs to be allowed for the site IT to operate? some
cloud service IP or such.... ?

alan

home help back first fref pref prev next nref lref last post