Hacker News new | past | comments | ask | show | jobs | submit login

I agree that you missed my point :)

My point is, any finite limit can be exceeded. In days of old, it was state tables and file descriptors. Now it's bandwidth. Filtering doesn't matter once the packet has traveled down your finite link to your packet filter. That bandwidth has been used, and denied service to a legitimate user that wanted his packet to go to your server.

Mostly, you're right, it comes down to luck. Attackers don't get the chance to do a daily dev / qa / release cycle. They write something, push it to a bunch of users who hate Amazon and Paypal today, and that's the end of it. If they wrote good code, the attack will be good. If they need to tweak something, they missed the opportunity.

That's what's saving everyone here -- luck.




Filtering of DDoS attacks is moving into the network. The days of sorting attack traffic at the destination have always been numbered.

Current best practice has been to use technologies like FLOWSPEC to get the traffic off the network much closer to the origin.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: