攻撃/DDoS/KrebsOnSecurityについて、ここに記述してください。

http://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/


21 KrebsOnSecurity Hit With Record DDoS (Sep 16)

Akamai (prolexic)から切り離された。-- ToshinoriMaeno 2016-09-22 23:34:02

しばらくはみられない。

watchNS/krebsonsecurity.com

ここが閉鎖されて、ここを攻撃していたbot(リソース)は次の獲物を攻撃することに 使われる( 使える)ことになる。それも問題だろう。

-- ToshinoriMaeno 2016-09-23 00:05:49

/Akamai

1. 言論の自由への攻撃

都合の悪いものへの攻撃

https://twitter.com/dangoodin001

http://arstechnica.com/security/2016/09/why-the-silencing-of-krebsonsecurity-opens-a-troubling-chapter-for-the-net/

Why the silencing of KrebsOnSecurity opens a troubling chapter for the ‘Net “Free speech in the age of the Internet is not really free,” journalist warns.

Dan Goodin - Sep 23, 2016 8:58 pm UTC

2. GRE attack

https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/

Krebsによれば、今回の攻撃はDNSを利用するものではなかったと。

generic routing encapsulation (GRE) data packets,
a communication protocol used to establish a direct, point-to-point connection
between network nodes.

GRE lets two peers share data they wouldn’t be able to share over the public network itself.

McKeay explained that the source of GRE traffic can’t be spoofed or faked the same way DDoS attackers can spoof DNS traffic.

Nor can junk Web-based DDoS attacks like those mentioned above. That suggests the attackers behind this record assault launched it from quite a large collection of hacked systems — possibly hundreds of thousands of systems.