[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Host.us DDOS attack -and- related conversations
I didn't want to pollute nanog list with my BCP38 (or other
solutions) ranting, but come on:
 How can insuring source IP's, coming out your network, are part of
your advertised subnets pathetic and futile?
Don't you think if the source ip are traceable back to OVH actually,
it would be easy for OVH to see and deal with it, instead of noises with
random source IP coming from the bunch of un-patched residential routers
in Latin America's (for example)?
And we're back on track with "do nothing but pay for protection" as
the only solution. Gotta love Humans.
Alain Hebert ahebert at pubnix.net
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911 http://www.pubnix.net Fax: 514-990-9443
On 08/03/16 10:40, James Bensley wrote:
> On 3 August 2016 at 15:16, Alain Hebert <ahebert at pubnix.net> wrote:
>> I will like to take this time to underline the lack of
>> participation from a vast majority of ISPs into BCP38 and the like. We
>> need to keep educating them at every occasion we have.
>> For those that actually implemented some sort of tech against
>> it, you are a beacon of hope in what is a ridiculous situation that has
>> been happening for more than 15 years.
> At the risk of starting a "NANOG war" , BCP isn't a magic wand.
> If I find a zero day in the nasty customised kernels that OVH run on
> their clients boxes, I only need 300 compromised hosts to send 300Gbps
> of traffic without spoofing the IP or using amplification attacks .
> I can rent a server with a 10Gbps connection for 1 hour for a few
> quid/dollars. I could generate hundreds of Gbps of traffic for about
> ?1000 from legitimate IPs, paid for with stolen card details. How will
> BCP save you then? Can everyone stop praising it like it was a some
> magic bullet?
>  A pathetic and futile one, so different from the rest.
>  Subsitute OVH for any half decent provider that isn't really oversubscribed.