Re: Death of dyndns

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 2014-04-14, Anthony K <akcentos@xxxxxxxxxx> wrote:
>
> Be aware of DND DDoS Amplification attack *[0]* if you are running this 
> DNS at home as it can quickly deplete your bandwidth (if your ISP gives 
> you quotas per month).  I use the following *[1]* to help stop these 
> queries. However, since I'm dropping these when they hit my router, I'm 
> still losing bandwidth but not at a terribly fast pace!
>
> Although the ISP can definitely stop such queries from getting to you, 
> it is not in their best interests and hence do nothing about it!

How is it not in their best interests?  They still have to waste their
bandwidth and routing to route the packets across their network.  If
it's a particularly persistent attack I imagine they'd rather block them
at their border.

...well, unless they get to charge you by the MB/GB.  Last I heard that
was more common outside the US.  In that case I suppose they might
prefer to get money from you rather than block the nuisance packets.
(Even in this case I imagine they'd prefer to block a very large-scale
DDoS, but those are probably rare against a typical home server.)

--keith


-- 
kkeller@xxxxxxxxxxxxxxxxxxxxxxxxxx


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux