Thanks everyone! Several people from Google responded very quickly, and the
issue was resolved faster than I can believe.
--Patrick Darden
--ARMC
Having a bit of diffculty with a Google matter. Was hoping to get pointed in
the right direction by someone from Google.
--Patrick Darden
[EMAIL PROTECTED]
Hi Mike,
Depending upon the type of DDOS, there are five things you should do in order:
1. immediate response: set your host based security to mitigate the attack.
E.g. mod_security for Apache web server, IPTables for host firewall. This will
keep the hard drives from filling up, the cpu f
I'm looking for documentation on how the US Government IPv6 mandate affects
associated agencies--e.g. healthcare providers, non-profits, or any company
that depends on US Gvt. funding, record keeping, or financial reimbursement for
services rendered (e.g. via Medicare).
Over the past 5 years
I understand you have no budget for a comercial load balancer; however, you
should consider setting up two inexpensive servers or PCs as load balancers.
You could do it with one, but that would itself be a single point of failure.
The OS and software are all free. Two old PCs would be next
If it continues for any length of time then contact above.net. To find their
contact information, check their registrar.
e.g. whois above.net gets you
Technical Contact:
AboveNet Communications, Inc. [EMAIL PROTECTED]
AboveNet Communications, Inc.
50 W SAN FER
Best way to do it is right after the SYN just count "one one thousand, two one
thousand" until you get the ACK. This works best for RFC 1149 traffic, but is
applicable for certain others as well.
I don't know of any automated tool, per se. You really couldn't do it *well*
on the software si
I see the site, not the error.
--Patrick Darden
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
Daniele Arena
Sent: Tuesday, January 15, 2008 12:48 PM
To: nanog@merit.edu
Subject: NANOG website unreachable?
Hi,
Am I the only one to get a 403 on http://
I'm not sure I understand. If a routing protocol such as BGP is being used,
this is considered normal behavior, and the routing determination is made
usually wrt either best route or best bandwidth. In the first case, a return
packet would usually follow on the same interface. In the second
They do. What you are seeing are probably forged packets. Nmap etc. all let
you forge SIP, in fact they automate it. One Nmap mode actually actively
obfuscates network scans by doing random SIPs--e.g. 10,000 random SIPs and one
real one--this makes it hard to figure out who is actually scan
>From my experience, a fast P4 linux box with 2 good NICs can NAT 45Mbps
>easily. I am NAT/PATing >4,000 desktops with extensive access control lists
>and no speed issues. This isn't over a 45Mb T3--this is over 100 Mb Ethernet.
--Patrick Darden
--ARMC, Internetworking Manager
-Origin
11 matches
Mail list logo