[nsp-sec] NTP reflection attacks

Daniel Schwalbe dfs at uw.edu
Wed Jan 8 16:11:05 EST 2014


Ack AS73. 

A bunch of our IPs listed are router gateway IPs, so I will have to do some digging as to what's going on there.

	-Daniel

--
Daniel Schwalbe
Assistant Director - Office of the CISO 
University of Washington 
Phone +1(206) 685-8210 | Email dfs at uw.edu


> -----Original Message-----
> From: nsp-security [mailto:nsp-security-bounces at puck.nether.net] On Behalf
> Of Jared Mauch
> Sent: Wednesday, January 08, 2014 11:39 AM
> To: Wentworth, Brett
> Cc: nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] NTP reflection attacks
> 
> ----------- nsp-security Confidential --------
> 
> On Thu, Jan 02, 2014 at 04:22:44PM +0000, Wentworth, Brett wrote:
> > ----------- nsp-security Confidential --------
> >
> > We are seeing a spike.  Anyone else?
> 
> Sure.
> 
> http://openntpproject/ntp-worst-cymru.txt is available for your remediation
> action.
> The website will be searchable soon, perhaps with the data from tomorrows
> scan.
> 
> - Jared
> 
> --
> Jared Mauch | +1 313 506 4307 * AS2914
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-
> measures.
> _______________________________________________




More information about the nsp-security mailing list