The recently publicized mechanism to leverage NTP servers for amplified DoS 
attacks is seriously effective.
I had a friend who had a local ISP affected by this Thursday and also another 
case where just two asterisk servers saturated a 100mbps link to the point of 
unusability.
Once more - this exploit is seriously effective at using bandwidth by 
reflection.

From a provider point of view, given the choices between contacting the 
end-users vs. mitigating the problem, if I were in TW position if I was unable 
to immediately contact the numerous downstream customers that were affected by 
this, I would take the option to block NTP on a case-by-case basis (perhaps 
even taking a broad brush) rather than allow it to continue and cause 
disruptions elsewhere.


- Mike

On Feb 2, 2014, at 12:44 PM, John Levine <jo...@iecc.com> wrote:

> In article <20140202163313.gf24...@hijacked.us> you write:
>> The provider has kindly acknowledged that there is an issue, and are
>> working on a resolution.  Heads up, it may be more than just my region.
> 
> I'm a Time-Warner cable customer in the Syracuse region, and both of
> the NTP servers on my home LAN are happily syncing with outside peers.
> 
> My real servers are hosted in Ithaca, with T-W being one of the
> upstreams and they're also OK.  They were recruited into an NTP DDoS
> last month (while I was at a meeting working on anti-DDoS best
> practice, which was a little embarassing) but they're upgraded and
> locked down now.
> 
> R's,
> John
> 
> 
> 


Reply via email to