-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nonMasqueradeCIDR DoS #1458
Comments
100.96 is in 10.64.0.0/10 and is reserved as described here https://tools.ietf.org/html/rfc6598#section-7. Still kind of a weird address space. |
Cool, thanks I was unaware of that block. |
Also, for more background, the IP was linked to an instance of Prometheus that we're using to scrape cluster metrics. It is pulling and pushing a lot of data on a single port which probably triggered the AWS alert. |
The IP range was chosen as the default because it is a weird one, but is reserved and big. 10.0.0.0/8 conflicts with EC2 classic. 172.16 conflicts with VPCs. 192.168 is pretty small. I hope that someone at AWS is just confused... if you can DM me the message that would be super-helpful! |
Seems like AWS liked our answer! Thanks for all the info and quick response! TIL about 100.64/10
|
Running a cluster built from Kops we recently got a notification from AWS that they had believed a server was experiencing a DoS attack. The IP they gave was in the 100.96 nonMasqueradeCIDR that is used by kops by default.
Correct me if I'm wrong, but it seems that this CIDR is a public IP range. Perhaps we should choose a CIDR that is private to avoid this scary warning in the future?
I'm also just looking for some background on why the above CIDR was chosen.
The text was updated successfully, but these errors were encountered: