How Cloudflare blocked a monumental 7.3 Tbps DDoS attack
Legacy protocols & QOTD angle
- Several commenters learned about or reminisced over the QOTD (Quote of the Day) protocol; some run it privately for fun.
- Others doubt there are many genuine QOTD servers left and suspect Cloudflare may just be classifying “UDP port 17” traffic as QOTD, possibly over-attributing.
- QOTD-over-UDP is noted as an easy reflection vector; QOTD-over-TCP or other stateful protocols are less amenable to amplification.
Botnet scale, behavior & attack purpose
- Commenters note 7.3 Tbps is “just” 7,000 nodes with 1 Gbps uplinks; modern home fiber plus cheap devices (IoT, routers, old PCs) makes that plausible.
- Typical C2 patterns are discussed: compromised devices polling dummy domains, DNS fast flux, and “botnet-as-a-service” offerings.
- A 45-second burst is seen as likely a test, “proof-of-capability” for a customer, a misfire, or a short “free sample” attack.
Cloudflare’s role: protection, centralization, and ethics
- Many view the post as good technical marketing: informative and not oversold.
- Others criticize Cloudflare for:
- Shielding DDoS-for-hire sites and other shady services behind its network.
- Contributing to centralization and making “just put it behind Cloudflare” the default instead of addressing root causes.
- A few report Cloudflare underperforming on HTTP-level (L7) attacks, especially on free plans, requiring manual rules on their own infrastructure.
Mitigation strategies & where responsibility lies
- Recurrent suggestions for ISPs:
- Egress filtering / BCP 38 to prevent source spoofing.
- Automated detection of abnormal flows (large UDP floods to one IP) and temporary throttling or disconnection.
- Taking abuse reports seriously instead of ignoring them.
- Others point out scaling, false positive, and economic issues: ISPs don’t want support load, metering/billing complexity, or to cut paying customers without regulation.
- Debate over punishing infected-end users (e.g., long-term throttling) vs. holding device makers/retailers accountable; strong disagreement on fairness and practicality.
- IoT insecurity is widely blamed as a long-term driver of botnets, with skepticism that consumers will ever manage security themselves.
Technical framing of DDoS
- Distinction emphasized between volumetric L3/L4 attacks (Cloudflare is strong) and L7/app-layer attacks that can bypass or overload origins despite Cloudflare.
- Some discuss BGP-based blackholing/flowspec as more scalable than “just buy a bigger pipe,” but requiring automation for short attacks.
- One thread nitpicks the article’s “three decades” phrasing for DDoS history; others dismiss this as unhelpful pedantry.
Disclosure, IPs & “feeding the trolls”
- Question whether publicizing record attacks gives botnet operators free advertising; others counter that exposing IPs (to networks, not publicly) weakens the botnet.
- Releasing full IP lists publicly is seen as risky—effectively a target list for re-compromise—though sharing with AS operators or services like AbuseIPDB is noted as common.