[111874] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Global Blackhole Service

daemon@ATHENA.MIT.EDU (Patrick W. Gilmore)
Sat Feb 14 17:46:08 2009

From: "Patrick W. Gilmore" <patrick@ianai.net>
To: NANOG list <nanog@nanog.org>
In-Reply-To: <87k57swsep.fsf@mid.deneb.enyo.de>
Date: Sat, 14 Feb 2009 17:45:11 -0500
Errors-To: nanog-bounces@nanog.org

On Feb 14, 2009, at 5:43 PM, Florian Weimer wrote:
> * Steven M. Bellovin:
>
>> As Randy and Valdis have pointed out, if this isn't done very  
>> carefully
>> it's an open invitation to a new, very effective DoS technique.  You
>> can't do this without authoritative knowledge of exactly who owns any
>> prefix; you also have to be able to authenticate the request to
>> blackhole it.  Those two points are *hard*.
>
> If you want to run a public exchange point, you need to solve the same
> announcement validation problem.  Multiple organizations appear to do
> it successfully, so it can't be that difficult.

No you don't.

And yes it is.

To be clear, I am not saying it should or should not be done, just  
that your comparison is invalid.

-- 
TTFN,
patrick



home help back first fref pref prev next nref lref last post