[Info-vax] How would you load balance excess webserver traffic between multiple OpenVMS servers?

ultr...@gmail.com ultradwc at gmail.com
Wed Jan 13 12:18:00 EST 2021


On Wednesday, January 13, 2021 at 10:20:44 AM UTC-5, Stephen Hoffman wrote:
> On 2021-01-13 14:15:09 +0000, Jan-Erik S derholm said: 
> 
> > Den 2021-01-13 kl. 14:22, skrev Simon Clubley:
> >> On 2021-01-12, Jan-Erik S鰀erholm <jan-erik.... at telia.com> wrote: 
> >>> 
> >>> You will not get any ransomeware attacks (not any successfull ones at 
> >>> least) on your VMS servers. 
> >> 
> >> What on earth makes you say that ??? 
> > 
> > The "ransomeware" attacs are done against the system where a mail 
> > client or a browser is running. None of that has any usage on VMS.
> "Nice web site you got there friend. It'd be a shame if somebody DDoS'd 
> you off the 'net." 
> 
> As has happened. 
> 
> DDoS rates above 300 GBps have happened. 
> 
> One DDoS I worked involving OpenVMS. That DDoS clobbered network 
> traffic. The DDoS traffic was using NTP reflection bug within OpenVMS. 
> That NTP bug got fixed a while back. In this case, the folks weren't 
> even targeting OpenVMS itself, just a flaw in OpenVMS, and their use of 
> that flaw knocked access to a crawl. They weren't even ransoming 
> OpenVMS network access, OpenVMS itself was "participating" in the DDoS 
> of somebody else to the extent of its internet connection.
> -- 
> Pure Personal Opinion | HoffmanLabs LLC

TOO BAD THEY DIDN'T THINK OF HIRING A DDOS FILTERING COMPANY TO HANDLE THAT FOR YOU.



More information about the Info-vax mailing list