Rich Smith wrote:
Huge hack 'is ugly sign of future'
http://www.bbc.co.uk/news/technology-26136774

Heh... Hackers using NTP
Explains the "lots of traffic" posts on this list in recent days

Rich


Yet again the focus is on NTP as the mechanism used in the attack.
However, this is unwarranted.  The problem is not NTP, the problem is the lack 
of
source address filtering.   Systems on the internet should be only allowed to 
send
traffic with their own address as source address.  Any other traffic should be 
dropped
by the first router they talk to.
This is easily arranged, only it is work to do without any direct payback for 
the ISP.
Therefore the ISPs are reluctant to take it on.

I propose that the existance of an ISP without source address filtering is 
handled by
a reputation system similar to what was brought in place to bring down open 
SMTP relays,
another thing that was once a common practice and that needed to be shut down
because they were being abused by miscreants.

Just disconnect every provider that refuses to set up source address filtering 
until
they give in.  No source address filtering?  No traffic from you. Period.

This will end this and many similar DDOS issues.  Allowing spoofed traffic is 
just not
acceptable anymore on the internet.
Just fixing NTP doesn't cut it, as many other protcols, even TCP, provide 
reflection.

Rob
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to