On Tuesday 17 October 2006 19:33, Jo Rhett took the opportunity to say:
Send a bunch of spam with a single forged sender address to a lot of
sites that do sender verification.  Watch their mail server fall down.
I can assure you that even with modern hardware, no e-mail MTA available
today can handle 20mb/sec of e-mail connections.  The best I have
personally observed is commercial Sendmail handling 12mb/sec.  (of
connections with no data transfer is a LOT of connections)

Magnus Holmgren wrote:
But surely the amount of traffic generated by the verifying servers is less than or approximately equal to the amount of traffic generated by the attacker?

no. One hundred messages to one hundred recipients is pretty low bandwidth out.

The thing with e.g. the DNS-based DDoS attacks that became common a while ago is that there is a considerable bandwidth amplification; you send a small query packet with a forged sender address, asking for a response that is known to be many times larger, to a large number of recursing nameservers.

Bingo. Very small spam messages with many recipients can get magnified by the sending mail servers. This works with e-mail, unlike any other TCP-based attack.

--
Jo Rhett
Network/Software Engineer
Net Consonance

Reply via email to