[182869] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: GoDaddy : DDoS : : Contact

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Mon Aug 3 10:00:26 2015

X-Original-To: nanog@nanog.org
From: "Roland Dobbins" <rdobbins@arbor.net>
To: nanog@nanog.org
Date: Mon, 03 Aug 2015 21:00:15 +0700
In-Reply-To: <D6E3F91B-B97C-4165-ADD9-9BDB0D0A4079@beckman.org>
Errors-To: nanog-bounces@nanog.org

On 3 Aug 2015, at 20:35, Mel Beckman wrote:

> But SYN floods are easily detected and deflected by all modern 
> firewalls. If a handshake doesn’t complete within a certain time 
> interval, the SYN is discarded.

This is incorrect.  I've seen a 20gb/sec stateful firewall taken down by 
a 3mb/sec spoofed SYN-flood due to DDoS exhaustion.  I've seen a 
10gb/sec load-balancer taken down by 60s of 6kpps of HOIC:

<https://app.box.com/s/a3oqqlgwe15j8svojvzl>

> The majority I’ve seen, however, are TCP.

<https://en.wikipedia.org/wiki/Hasty_generalization>

> In any event, I think it’s not useful to misuse the term DDoS, and 
> that it refers to any attack where the source addresses are 
> distributed across the Internet, making them difficult to identify and 
> therefore block.

Again, that ship sailed long ago.

-----------------------------------
Roland Dobbins <rdobbins@arbor.net>

home help back first fref pref prev next nref lref last post