Author Topic: Computer security folks, legit threat or overblown?  (Read 598 times)

Balog

  • Unrepentant race traitor
  • friends
  • Senior Member
  • ***
  • Posts: 17,774
  • What if we tried more?
Computer security folks, legit threat or overblown?
« on: February 14, 2014, 08:47:01 PM »
http://threatpost.com/400-gbps-ntp-amplification-attack-alarmingly-simple/104256

I'd try to sum this up but I frankly didn't fully grok most of the technical stuff. Is this a legit new issue or just journos being journos?
Quote from: French G.
I was always pleasant, friendly and within arm's reach of a gun.

Quote from: Standing Wolf
If government is the answer, it must have been a really, really, really stupid question.

Azrael256

  • friend
  • Senior Member
  • ***
  • Posts: 2,083
Re: Computer security folks, legit threat or overblown?
« Reply #1 on: February 15, 2014, 12:06:07 AM »
Meh.  Legit-ish.  DDoS attacks happened before this, and will happen after.

It's easy to disable the attack vector.  It's not a data breach kind of issue, so.. Meh.

mtnbkr

  • friend
  • Senior Member
  • ***
  • Posts: 15,388
Re: Computer security folks, legit threat or overblown?
« Reply #2 on: February 15, 2014, 08:08:33 AM »
Unfortunately, a lot of orgs used external NTP sources (rather than standing up their own NTP services in-house).  Many of those DON'T pay attention to traffic on port 123 even when it is suspicious because "it's just NTP". 

Chris

RevDisk

  • friend
  • Senior Member
  • ***
  • Posts: 12,633
    • RevDisk.net
Re: Computer security folks, legit threat or overblown?
« Reply #3 on: February 15, 2014, 07:14:54 PM »

Old technique, legit issue. It would only take 50 lines of C to cripple a large section of the internet using DNS amplification attacks. But far from original.
"Rev, your picture is in my King James Bible, where Paul talks about "inventors of evil."  Yes, I know you'll take that as a compliment."  - Fistful, possibly highest compliment I've ever received.