zlacker

[return to "Mitigating a DDoS on Mastodon"]
1. ekimek+ye[view] [source] 2019-12-06 10:57:47
>>dredmo+(OP)
On the subject of the IP leaking: Note that IPv4 only has 2^32 addresses, and people can and do mass scan all of them (see here shodan.io). If your service is exposing any identifiable information (ie. if it's not completely blocking all non-cloudflare IPs) then it's fairly easy to find even if it's "unguessable".
◧◩
2. tyingq+ei[view] [source] 2019-12-06 11:40:42
>>ekimek+ye
That's an interesting side topic. What do services like Shodan do in an ipv6 world? Dumb brute force scanning seems unlikely.
◧◩◪
3. Nextgr+xk[view] [source] 2019-12-06 12:05:01
>>tyingq+ei
They run NTP servers that are (were?) included in the NTP pool to fish for clients’ IPv6 addresses.
[go to top]