Since we're on the topic of DoS. What best practice actions can be taken AFTER 
such an attack?




> Subject: Re: he.net down?
> From: patr...@ianai.net
> Date: Mon, 3 Oct 2011 19:33:10 -0400
> To: nanog@nanog.org
> 
> On Oct 3, 2011, at 7:25 PM, Nate Itkin wrote:
> > On Mon, Oct 03, 2011 at 11:14:03PM +0000, Michael J McCafferty wrote:
> >> Our session with them is up and down at Any2 at OWB.
> >> 
> >> ------Original Message------
> >> From: Aiden Sullivan
> >> To: nanog@nanog.org
> >> Subject: he.net down?
> >> Sent: Oct 3, 2011 3:35 PM
> >> 
> >> www.he.net seems to be down on both IPv4 and IPv6 -- does anyone know what 
> >> is
> >> going on?
> >> -- 
> >> Aiden
> >> Sent from my Verizon Wireless BlackBerry
> > 
> > 
> > Blaming DDOS.  http://status.linode.com
> > 
> > "The incident was a probable DDOS attack, but its behavior was unusual and 
> > difficult to identify. Our network engineers made some adjustments to the 
> > DOS countermeasures acquired after last week's incident, and that seems to 
> > have stabilized traffic flow. We apologize for the inconvenience. -Ben 
> > Larsen Hurricane Electric Internet Services"
> > 
> > Some supporting evidence would be nice.
> 
> Exactly what do you expect a network which is attacked to post to NANOG, or a 
> random web page, to "prove" they were attacked?  Given the 1000s of network 
> outages over the last decade, I can think of maybe a handful that supplied 
> "supporting evidence".
> 
> As I said before, Mike & the gang at HE are stand-up people.  If they said it 
> was a DoS, it was a DoS - although I note they did not say it was a DoS, just 
> probably a DoS.  But I extend my faith if their lack of prevarication to even 
> statement as well.  In fact, it speaks well that they are being equivocal 
> until they are certain themselves.
> 
> -- 
> TTFN,
> patrick
> 
> 
                                          

Reply via email to