[190947] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Host.us DDOS attack

daemon@ATHENA.MIT.EDU (Tony Wicks)
Wed Aug 3 17:29:23 2016

X-Original-To: nanog@nanog.org
From: "Tony Wicks" <tony@wicks.co.nz>
To: "'NANOG list'" <nanog@nanog.org>
In-Reply-To: <007301d1edcb$7191ce60$54b56b20$@wicks.co.nz>
Date: Thu, 4 Aug 2016 09:27:57 +1200
WTL-MailScanner-From: tony@wicks.co.nz
Errors-To: nanog-bounces@nanog.org

Further to that, and I would suggest it should be part of the overall =
discussion here. It appears the IPv4 IP block my VM is in is not =
currently advertised on the world route table. I assume hostus.us's =
transit provider has dropped their ipv4 BGP to save themselves. This is =
really the ultimate reward for the extortionists as they don't even need =
to sustain the DDOS to attack their target. While I see the transit =
providers point of view, it=E2=80=99s a pretty shitty situation for =
their customer, and their customers/customers.



-----Original Message-----
From: NANOG [mailto:nanog-bounces@nanog.org] On Behalf Of Tony Wicks
Sent: Thursday, 4 August 2016 9:10 AM
To: 'NANOG list' <nanog@nanog.org>
Subject: RE: Host.us DDOS attack

Interestingly my VM (LA) with them has been effectively down for half a =
day as far as IPv4 is concerned. IPv6 traffic seems unaffected.=20







home help back first fref pref prev next nref lref last post