That was a really big attack. The scary part is that it's all DNS reflection, meaning the attackers only need 3Gbps of bandwidth to generate 300Gbps of DDoS. Imagine if they compromised some of the medium sized corporate networks along with these Botnets. I don't know if the exchanges could hold up against 1Tbps of DDoS, and the difference between 300 and 1000Gbps is not a lot. While I'm excited that CloudFlare is doing such a good job bringing this to the attention of the masses I can't help but feel that this is essentially a time bomb. If this attack was an order of magnitude larger, things might be very different. Cheers, Joshua Sent from my iPhone On Mar 27, 2013, at 12:10 PM, "Warren Bailey" <wbailey@satelliteintelligencegroup.com> wrote:
Is someone pissed off at Spamhaus, or was the intention to packet them so hard their entire network ceased to exist so they can no longer offer DROP/RBL/xyz service?
Seldom do hax0r nations target things without some type of "justification". I don't really care who is being internet murdered, I care why.
It's probably the same people who have been posting news articles from Ashworth's email.
On 3/27/13 11:44 AM, "Jay Ashworth" <jra@baylink.com> wrote:
http://blog.cloudflare.com/the-ddos-that-almost-broke-the-internet
Yes: 120 gigabits/second, primarily of DNS amplification traffic.
Still think it's optional to implement BCP38 pervasively?
Cheers, -- jra -- Jay R. Ashworth Baylink jra@baylink.com Designer The Things I Think RFC 2100 Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII St Petersburg FL USA #natog +1 727 647 1274