[Info-vax] How would you load balance excess webserver traffic between multiple OpenVMS servers?
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Wed Jan 13 10:20:42 EST 2021
On 2021-01-13 14:15:09 +0000, Jan-Erik Sderholm said:
> Den 2021-01-13 kl. 14:22, skrev Simon Clubley:
>> On 2021-01-12, Jan-Erik Söderholm <jan-erik.soderholm at telia.com> wrote:
>>>
>>> You will not get any ransomeware attacks (not any successfull ones at
>>> least) on your VMS servers.
>>
>> What on earth makes you say that ???
>
> The "ransomeware" attacs are done against the system where a mail
> client or a browser is running. None of that has any usage on VMS.
"Nice web site you got there friend. It'd be a shame if somebody DDoS'd
you off the 'net."
As has happened.
DDoS rates above 300 GBps have happened.
One DDoS I worked involving OpenVMS. That DDoS clobbered network
traffic. The DDoS traffic was using NTP reflection bug within OpenVMS.
That NTP bug got fixed a while back. In this case, the folks weren't
even targeting OpenVMS itself, just a flaw in OpenVMS, and their use of
that flaw knocked access to a crawl. They weren't even ransoming
OpenVMS network access, OpenVMS itself was "participating" in the DDoS
of somebody else to the extent of its internet connection.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list