[nsp-sec] NTP reflection attacks
Fronenbroek, Kick
kfronenbroek at libertyglobal.com
Mon Jan 6 11:38:53 EST 2014
Hi John, thanks for the email and offer.
My colleague has a script created that is verifying our own infra (actually finished - require to consume the data). I think we have enough data to work on - no need for you to grep through the data for our AS’s. Better focus on the other requests :)
Thanks,
Kick
On 06 Jan 2014, at 17:32 , John Kristoff <jtk at cymru.com> wrote:
> ----------- nsp-security Confidential --------
>
> On Mon, 6 Jan 2014 09:33:07 -0600
> John Kristoff <jtk at cymru.com> wrote:
>
>> If you get data through us via TC Console, you should see any open
>> NTP servers for your net there.
>
> My mistake. We once had it there, but took it out awhile back. Why
> I'm not sure, but I'll check to see if we can make it as readily
> available as we do the open resolver insight. Offer is still open for
> me to do an ad hoc check for you manually, but please be patient as
> all these offline requests are starting to pile up. :-)
>
> John
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
More information about the nsp-security
mailing list