[52896] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: WP: Attack On Internet Called Largest Ever

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Wed Oct 23 03:17:23 2002

To: Jeff S Wheeler <jsw@five-elements.com>
Cc: nanog@merit.edu
In-Reply-To: Your message of "Tue, 22 Oct 2002 20:35:06 EDT."
             <1035333306.3296.5608.camel@intrepid> 
From: Valdis.Kletnieks@vt.edu
Date: Wed, 23 Oct 2002 03:16:48 -0400
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_-2063916512P
Content-Type: text/plain; charset=us-ascii

On Tue, 22 Oct 2002 20:35:06 EDT, Jeff S Wheeler <jsw@five-elements.com>  said:
>
> performance this seems true.  However, I did notice that several of the
> servers which are operated by VeriSign were not responding to at least a
> large, 50% or greater, fraction of test queries.  Even so, VeriSign was
> good enough to chime in that their root servers were unaffected.
> 
> Did I mis-perceive this, or is it another bold-faced lie from VeriSign?

If a server that can handle 500K packets/sec is sitting behind a pipe that
maxes out at 400K packets/sec, it won't be affected when the pipe is flooded.

Most likely, half your packets were being dropped 2 or 3 hops from the
server (where the DDoS starts converging from multiple sources).  So we
probably can't pin a "bold-faced lie" on VeriSign this time.  Dissembling
and misleading perhaps, but not a total lie (unless somebody can prove that
the pipe still had capacity and wasn't dropping stuff)

-- 
				Valdis Kletnieks
				Computer Systems Senior Engineer
				Virginia Tech


--==_Exmh_-2063916512P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQE9tkzgcC3lWbTT17ARAkciAKDnX/PjmT1yKFakEAub4TxoV+9b2gCg1jqZ
xRIK6NLAjj7FOqCom7q+GWI=
=lMU4
-----END PGP SIGNATURE-----

--==_Exmh_-2063916512P--

home help back first fref pref prev next nref lref last post