[191645] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Krebs on Security booted off Akamai network after DDoS attack

daemon@ATHENA.MIT.EDU (John Levine)
Sat Sep 24 10:48:23 2016

X-Original-To: nanog@nanog.org
Date: 24 Sep 2016 14:47:57 -0000
From: "John Levine" <johnl@iecc.com>
To: nanog@nanog.org
In-Reply-To: <CAL9jLabFQLQzPmAFTrSxQJon=Ak5adGifZ0b-MZ9jAJO1skupQ@mail.gmail.com>
Errors-To: nanog-bounces@nanog.org

>> Well...by anycast, I meant BGP anycast, spreading the "target"
>> geographically to a dozen or more well connected/peered origins.  At that
>> point, your ~600G DDoS might only be around
>
>anycast and tcp? the heck you say! :)

People who've tried it say it works fine.  Routes don't flap that often.


home help back first fref pref prev next nref lref last post