SANTA FE, NM -- If you can't reach your favorite Linux developer by IM or email today, it's because they're under a Denial of Service (DoS) attack. The top programmers are all at the Linux Plumbers conference, which is being hammered by an internet attacker.
Yes, even the best developers of the world can be put out of the commission when their internet is strangled.
According to James Bottomley, an IBM Research distinguished engineer and a member of the Linux Plumbers Conference committee, "Since yesterday we are being attacked from the outside. The attack follows us as we switch external IP and the team has identified at least one inside node which looks suspicious."
The conference is not being attacked by some sophisticated Internet of Things (IoT) Distributed Denial-of-Service (DDoS) attack like the Dyn attack. No, it's being mugged by one of the oldest attacks in the DoS book: a SYN flood.
In a SYN flood, the attacker breaks the normal TCP-startup three-way connection hand-shake. If you do this enough times, by "flooding" the router, the router runs out of memory and no one is able to make internet connections.
The truly annoying thing about this type of attack --which has been around for more than 20 years -- is that it's easy to prevent. There are at least eight, count them eight, ways to mitigate SYN floods.
What's far more troubling is that the Santa Fe ISP didn't have any of the SYN flood defenses up. We know that massive internet-killing DDoS attacks are on their way; and here we find a national ISP in a state capital can't deal with an old-fashioned internet assault.
I've predicted we'll see serious internet breakdown this year. Looking at this local internet slowdown, I'm surprised it hasn't already. Yes, a lot of blame for internet attacks goes to IoT manufacturers and insufficiently hardened web servers, but ISPs are guilty of poor security as well.