[Info-vax] How would you load balance excess webserver traffic between multiple OpenVMS servers?
ultr...@gmail.com
ultradwc at gmail.com
Wed Jan 13 12:18:00 EST 2021
On Wednesday, January 13, 2021 at 10:20:44 AM UTC-5, Stephen Hoffman wrote:
> On 2021-01-13 14:15:09 +0000, Jan-Erik S derholm said:
>
> > Den 2021-01-13 kl. 14:22, skrev Simon Clubley:
> >> On 2021-01-12, Jan-Erik S鰀erholm <jan-erik.... at telia.com> wrote:
> >>>
> >>> You will not get any ransomeware attacks (not any successfull ones at
> >>> least) on your VMS servers.
> >>
> >> What on earth makes you say that ???
> >
> > The "ransomeware" attacs are done against the system where a mail
> > client or a browser is running. None of that has any usage on VMS.
> "Nice web site you got there friend. It'd be a shame if somebody DDoS'd
> you off the 'net."
>
> As has happened.
>
> DDoS rates above 300 GBps have happened.
>
> One DDoS I worked involving OpenVMS. That DDoS clobbered network
> traffic. The DDoS traffic was using NTP reflection bug within OpenVMS.
> That NTP bug got fixed a while back. In this case, the folks weren't
> even targeting OpenVMS itself, just a flaw in OpenVMS, and their use of
> that flaw knocked access to a crawl. They weren't even ransoming
> OpenVMS network access, OpenVMS itself was "participating" in the DDoS
> of somebody else to the extent of its internet connection.
> --
> Pure Personal Opinion | HoffmanLabs LLC
TOO BAD THEY DIDN'T THINK OF HIRING A DDOS FILTERING COMPANY TO HANDLE THAT FOR YOU.
More information about the Info-vax
mailing list