[nsp-sec] NTP reflection attacks
Daniel Schwalbe
dfs at uw.edu
Wed Jan 8 16:11:05 EST 2014
Ack AS73.
A bunch of our IPs listed are router gateway IPs, so I will have to do some digging as to what's going on there.
-Daniel
--
Daniel Schwalbe
Assistant Director - Office of the CISO
University of Washington
Phone +1(206) 685-8210 | Email dfs at uw.edu
> -----Original Message-----
> From: nsp-security [mailto:nsp-security-bounces at puck.nether.net] On Behalf
> Of Jared Mauch
> Sent: Wednesday, January 08, 2014 11:39 AM
> To: Wentworth, Brett
> Cc: nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] NTP reflection attacks
>
> ----------- nsp-security Confidential --------
>
> On Thu, Jan 02, 2014 at 04:22:44PM +0000, Wentworth, Brett wrote:
> > ----------- nsp-security Confidential --------
> >
> > We are seeing a spike. Anyone else?
>
> Sure.
>
> http://openntpproject/ntp-worst-cymru.txt is available for your remediation
> action.
> The website will be searchable soon, perhaps with the data from tomorrows
> scan.
>
> - Jared
>
> --
> Jared Mauch | +1 313 506 4307 * AS2914
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-
> measures.
> _______________________________________________
More information about the nsp-security
mailing list