Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Networking

Misconfigured Open DNS Resolvers Key To Massive DDoS Attacks 179

msm1267 writes with an excerpt From Threat Post: "While the big traffic numbers and the spat between Spamhaus and illicit webhost Cyberbunker are grabbing big headlines, the underlying and percolating issue at play here has to do with the open DNS resolvers being used to DDoS the spam-fighters from Switzerland. Open resolvers do not authenticate a packet-sender's IP address before a DNS reply is sent back. Therefore, an attacker that is able to spoof a victim's IP address can have a DNS request bombard the victim with a 100-to-1 ratio of traffic coming back to them versus what was requested. DNS amplification attacks such as these have been used lately by hacktivists, extortionists and blacklisted webhosts to great success." Running an open DNS resolver isn't itself always a problem, but it looks like people are enabling neither source address verification nor rate limiting.

Comment Re:Kudos (Score 1) 1061

"They have made MILLIONS off of suing people that attack them for their repugnant views." I've heard this statement made frequently, can you provide a source to a list of these cases including any damaged that they have collected?

Comment Re:Why does this matter? (Score 5, Interesting) 414

"How do you 'hide' the damage these cars have? ;-)" Easy, pop a kick panel and inspect any ground cables, and exposed metal above the floor level. These cars start rusting within days of exposure, and you can usually see a waterline once the carpet and/or kick panels have been exposed. I've had the not-so-pleasure of informing numerous people that their cars were submersed at some point in their history, and not a single person has responded with anything similar to "oh yea, I already know that".

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...