[nsp-sec] NTP reflection attacks

Fronenbroek, Kick kfronenbroek at libertyglobal.com
Mon Jan 6 11:38:53 EST 2014


Hi John, thanks for the email and offer.

My colleague has a script created that is verifying our own infra (actually finished - require to consume the data). I think we have enough data to work on - no need for you to grep through the data for our AS’s. Better focus on the other requests :)

Thanks,
Kick

On 06 Jan 2014, at 17:32 , John Kristoff <jtk at cymru.com> wrote:

> ----------- nsp-security Confidential --------
> 
> On Mon, 6 Jan 2014 09:33:07 -0600
> John Kristoff <jtk at cymru.com> wrote:
> 
>> If you get data through us via TC Console, you should see any open
>> NTP servers for your net there.
> 
> My mistake.  We once had it there, but took it out awhile back.  Why
> I'm not sure, but I'll check to see if we can make it as readily
> available as we do the open resolver insight.  Offer is still open for
> me to do an ad hoc check for you manually, but please be patient as
> all these offline requests are starting to pile up.  :-)
> 
> John
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________





More information about the nsp-security mailing list