[10787] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NSPs and filters (fwd)

daemon@ATHENA.MIT.EDU (Jon Lewis)
Mon Jul 14 13:18:01 1997

Date: Mon, 14 Jul 1997 12:47:17 -0400 (EDT)
From: Jon Lewis <jlewis@inorganic5.fdt.net>
To: Daniel Senie <dts@proteon.com>
cc: "Sean M. Doran" <smd@clock.org>, Michael <michael@dook.org>,
        ice 9 <ice9@paranoia.com>, nanog@merit.edu
In-Reply-To: <33CA53EC.FD440E01@proteon.com>

On Mon, 14 Jul 1997, Daniel Senie wrote:

> And it goes beyond that... Every PC running Windows (or any other OS,
> for that matter) has complete ability to do anything with IP. So, any
> user on a dialup line into any ISP is a possible source of attacks.

Not at 1.5mbps :).  Granted I've seen effective synflooding come from a
dialup customer.  Can you say luserdel.  I think you can. :)

> This is why I think the RAS servers need to be able to filter right at
> the point of the dialup. There, the comparison is a simple compare of a
> 32 bit integer (IP address assigned to the dialup user, compared to the
> IP address of packets received from the user). Any discrepancies should
> set off alarm bells...

It's mostly that simple, but not entirely.  Filters for dialup subnet
customers would likely need to make 2 comparisons.

------------------------------------------------------------------
 Jon Lewis <jlewis@fdt.net>  |  Unsolicited commercial e-mail will
 Network Administrator       |  be proof-read for $199/message.
 Florida Digital Turnpike    |  
________Finger jlewis@inorganic5.fdt.net for PGP public key_______


home help back first fref pref prev next nref lref last post