http://www.antionline.com/cgi-bin/News?type=antionline&date=05-31-1999&story=dos.news
AntiOnline Mans Battle Stations
Wednesday, June 2, 1999 at 1:11:02
by John Vranesevich - Founder of AntiOnline
As part of its full disclosure policy on changes
in its network or system status, AntiOnline
provides the following:
[When under fire for questionable 'leaked' documents, the word "disclosure"
suddenly means nothing to AntiOnline. Worse, it is easy to question whether
or not there is even disclosure on his network stats.]
AntiOnline came under siege by a massive
denial-of-service attack starting at 8:03pm EST
yesterday. At the time this report was filed,
the attack was continuing, although the network
is no longer feeling its effects. The AntiOnline
website was unavailable for a total of 3 hours,
54 minutes.
[Yet dozens of people wer complaining as far back as Saturday, making
this closer to a five day DoS attack as of this report. Upon visiting
the AntiOnline site, it took over 100 attemtps at reloading to get
past the "connection reset by peer" error, which is one sign of
a DoS attack.]
In cooperation with AntiOnline staff member
Corey Gallatin, who is also a Senior Data
Engineer for Sprint, we re-configured our Cisco
Router, which is running the Enterprise Plus
revision of IOS, to respond better to the
attack.
[snip...]
[I also can't help but to notice that active distribution of such utilities can
lead to being bitten in the ass.
http://www.anticode.com/
http://www.anticode.com/cgi-bin/showdsc.anticode?cat=denial-of-service/icmp-flooders.html
6.03.99 10AM MST Server: 503
6.03.99 11AM MST Server: 503