[asterisk-users] Amazon EC2 SIP floods - you can help
Stuart Sheldon
stu at actusa.net
Sun Apr 18 10:38:33 CDT 2010
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Randy R wrote:
> On Sun, Apr 18, 2010 at 1:56 PM, Tzafrir Cohen <tzafrir.cohen at xorcom.com> wrote:
>> It seems that at least Slashdot is responsive:
>>
>> http://it.slashdot.org/story/10/04/17/2059256/SIP-Attacks-From-Amazon-EC2-Going-Unaddressed
>
> Yes, there's a lot of talk here, some of it sympathetic, some less so,
> but at least there's discussion. I expect a response from Amazon at
> some point, but not until the visibility level becomes painful. One
> other person in the Slashdot posts threatens to stop buying things
> from Amazon. More of those will likely surface.
>
> I a related question, if the IP addresses were spoofed, how could a
> response be directed back? Don't the register attempts, because they
> need a response necessarily carry the correct source IP?
>
> /r
>
Yes,
If the IP addresses were spoofed, it would be simply a DoS attack.
Stu
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org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=b2RY
-----END PGP SIGNATURE-----
More information about the asterisk-users
mailing list