[Info-vax] How would you load balance excess webserver traffic between multiple OpenVMS servers?

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Wed Jan 13 10:20:42 EST 2021


On 2021-01-13 14:15:09 +0000, Jan-Erik Sderholm said:

> Den 2021-01-13 kl. 14:22, skrev Simon Clubley:
>> On 2021-01-12, Jan-Erik Söderholm <jan-erik.soderholm at telia.com> wrote:
>>> 
>>> You will not get any ransomeware attacks (not any successfull ones at
>>> least) on your VMS servers.
>> 
>> What on earth makes you say that ???
> 
> The "ransomeware" attacs are done against the system where a mail 
> client or a browser is running. None of that has any usage on VMS.

"Nice web site you got there friend. It'd be a shame if somebody DDoS'd 
you off the 'net."

As has happened.

DDoS rates above 300 GBps have happened.

One DDoS I worked involving OpenVMS. That DDoS clobbered network 
traffic. The DDoS traffic was using NTP reflection bug within OpenVMS. 
That NTP bug got fixed a while back. In this case, the folks weren't 
even targeting OpenVMS itself, just a flaw in OpenVMS, and their use of 
that flaw knocked access to a crawl. They weren't even ransoming 
OpenVMS network access, OpenVMS itself was "participating" in the DDoS 
of somebody else to the extent of its internet connection.


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list