- From: Erik Nygren <erik+ietf@nygren.org>
- Date: Thu, 15 Jul 2021 19:25:00 -0400
- To: Mark Nottingham <mnot@mnot.net>
- Cc: HTTP Working Group <ietf-http-wg@w3.org>, IETF QUIC WG <quic@ietf.org>
Received on Thursday, 15 July 2021 23:25:24 UTC
On Wed, Jul 14, 2021 at 8:21 PM Mark Nottingham <mnot@mnot.net> wrote:
> [ bringing this up on both lists because it's not yet clear what the right
> scope is ]
>
> It's not uncommon for servers to block certain UDP source ports to avoid
> being overwhelmed by certain reflection attacks. In particular:
>
> * 53 - DNS
> * 123 - NTP
> * 1900 - SSDP
> * 5353 - mDNS
> * 11211 - memcached
>
> ... among other candidates.
>
> See, eg., <https://blog.cloudflare.com/reflections-on-reflections/>. This
> isn't done to avoid protocol vulnerabilities as such -- it's to avoid
> volumetric attacks (usually DDoS).
>
>
Closely related, the Fetch spec's "bad port" list is fairly TCP-specific
and could likely
use additions for some of these. I opened
https://github.com/whatwg/fetch/issues/1268
to track that.
Erik
Received on Thursday, 15 July 2021 23:25:24 UTC