Re: Centurylink Looking Glass fail

2019-08-18 Thread Mitcheltree, Harold B
+1, or reactivate the Level(3) AS 3356 LG. --pete From: NANOG on behalf of Ca By Sent: Sunday, August 18, 2019 4:49 PM To: North American Network Operators' Group Subject: Centurylink Looking Glass fail Paging someone at Centurylink to fix your looking glass.

Re: syn flood attacks from NL-based netblocks

2019-08-18 Thread Damian Menscher via NANOG
On Sun, Aug 18, 2019 at 6:42 AM Amir Herzberg wrote: > The current packets could be part of a research experiment about this > threat, or the instrumentation part of preparing such attack. I would not > rule out research, since it isn't trivial to know if the attack can be > really viable to clog

Centurylink Looking Glass fail

2019-08-18 Thread Ca By
Paging someone at Centurylink to fix your looking glass. https://lookingglass.centurylink.com None of the functions in any of the cities work Your network is kind of a big deal, so please try to provide visibility to your routing state so the rest of us can do our day-job, on Sunday

Re: syn flood attacks from NL-based netblocks

2019-08-18 Thread Mike
On 8/18/19 6:41 AM, Amir Herzberg wrote: > The number of TCP syn-ack amplifiers is large. It may suffice to allow > clogging a provider or IX, using low load per amplifier, as described. > Such low load is likely to be undetected by most operators, and even > when detected (e.g. by Jim), only few (

Re: syn flood attacks from NL-based netblocks

2019-08-18 Thread Amir Herzberg
The number of TCP syn-ack amplifiers is large. It may suffice to allow clogging a provider or IX, using low load per amplifier, as described. Such low load is likely to be undetected by most operators, and even when detected (e.g. by Jim), only few (e.g. Mike) will have sufficient motivation to blo