1 Yottabyte DDoS Attack – The Biggest DDoS Attack in History!

No, a yottabyte DDoS attack has not happened. Someday we will have a yottabyte DDoS, just not today. Tomorrow we will have another press release on “the largest DDoS attack ever.” Will that be important? No, bragging about the size of DDoS Attacks is a distraction to the realities of the Internet and the real Read More

Filtering Exploitable Ports & Minimizing Customer Risk

  Barry Greene @ bgreene@senki.org Version 1.0 TLP:WHITE Updates for this Best Common Practice (BCP) are maintained on this page: Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers Recommendation: Operators (CSPs, ISPs, Cloud Companies, and Hosting Companies) are strongly encouraged to deploy Port Filtering on the known Exploitable ports and Read More

Everyone should be deploying BCP 38! Wait, they are ….

Have you deployed BCP 38 in your network? For most networks, the answer is yes. During last week’s FCC CSRIC III meeting, several people called on operators to deploy “BCP 38.” This IETF best common practice (BCP) is packet filter placed on the edge of networks to insure that the IP source cannot pretend to Read More