[nsp-sec] NTP reflection attacks
SURFcert - Peter
p.g.m.peters at utwente.nl
Wed Jan 15 03:27:59 EST 2014
Phil,
Phil Rosenthal wrote on 15-01-2014 05:57:
> Just a heads up. We are now starting to see a new type of attack on
> downstream customers, with NTP monlist directed at an open chargen.
I have seen this with a twist. In our case it was not against an open
NTP monlist server but the regular NTP server. So not really much of an
amplification but overall a whole lot higher load on the server and the
network.
--
Peter Peters /------\ SURFnet bv
SURFcert | SURF | cert.surfnet.nl
cert at surfnet.nl \-----\ \-----\ Postbus 19035
PGP Key ID 0x5A52C966 | CERT | NL-3501 DA Utrecht
+31 30 2305 305 \------/ fax: +31 30 2305 329
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20140115/b96c4133/attachment-0001.sig>
More information about the nsp-security
mailing list