[191679] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Krebs on Security booted off Akamai network after DDoS attack

daemon@ATHENA.MIT.EDU (Chris Woodfield)
Sun Sep 25 14:46:45 2016

X-Original-To: nanog@nanog.org
From: Chris Woodfield <rekoil@semihuman.com>
In-Reply-To: <20160924144757.6291.qmail@ary.lan>
Date: Sun, 25 Sep 2016 11:46:40 -0700
To: John Levine <johnl@iecc.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

> On Sep 24, 2016, at 7:47 AM, John Levine <johnl@iecc.com> wrote:
>=20
>>> Well...by anycast, I meant BGP anycast, spreading the "target"
>>> geographically to a dozen or more well connected/peered origins.  At =
that
>>> point, your ~600G DDoS might only be around
>>=20
>> anycast and tcp? the heck you say! :)
>=20
> People who've tried it say it works fine.  Routes don't flap that =
often.
>=20

There are a number of companies terminating anycasted TCP endpoints =
without issue. It=E2=80=99s not exactly turnkey, but it=E2=80=99s hardly =
black magic either.=20

Here=E2=80=99s Nick Holt @Microsoft presenting their experience: =
https://www.youtube.com/watch?v=3D40MONHHF2BU =
<https://www.youtube.com/watch?v=3D40MONHHF2BU>=20

-Chris=

home help back first fref pref prev next nref lref last post