攻撃/DDoS/KrebsOnSecurityについて、ここに記述してください。 http://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/ http://krebsonsecurity.com/?s=hackforums&x=0&y=0 http://www.spoofit.org/ ---- 21 KrebsOnSecurity Hit With Record DDoS (Sep 16) Akamai (prolexic)から切り離された。-- ToshinoriMaeno <> https://twitter.com/briankrebs/status/779077374302363648 しばらくはみられない。 [[watchNS/krebsonsecurity.com]] ここが閉鎖されて、ここを攻撃していたbot(リソース)は次の獲物を攻撃することに 使われる( 使える)ことになる。それも問題だろう。 -- ToshinoriMaeno <> [[/Akamai]] == 言論の自由への攻撃 == 都合の悪いものへの攻撃 https://twitter.com/dangoodin001  Why the record-breaking DDoS on KrebsOnSecurity opens a troubling chapter for the Net http://arstechnica.com/security/2016/09/why-the-silencing-of-krebsonsecurity-opens-a-troubling-chapter-for-the-net/ Why the silencing of KrebsOnSecurity opens a troubling chapter for the ‘Net “Free speech in the age of the Internet is not really free,” journalist warns. Dan Goodin - Sep 23, 2016 8:58 pm UTC == GRE attack == https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/ Krebsによれば、今回の攻撃はDNSを利用するものではなかったと。 {{{ generic routing encapsulation (GRE) data packets, a communication protocol used to establish a direct, point-to-point connection between network nodes. GRE lets two peers share data they wouldn’t be able to share over the public network itself. }}} McKeay explained that the source of GRE traffic can’t be spoofed or faked the same way DDoS attackers can spoof DNS traffic. Nor can junk Web-based DDoS attacks like those mentioned above. That suggests the attackers behind this record assault launched it from quite a large collection of hacked systems — possibly hundreds of thousands of systems.