[12793] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Denial of service attacks apparently from UUNET Netblocks

daemon@ATHENA.MIT.EDU (Joe Shaw)
Wed Oct 8 12:04:28 1997

Date: Wed, 8 Oct 1997 10:33:16 -0500 (CDT)
From: Joe  Shaw <jshaw@insync.net>
To: Barney Wolff <barney@databus.com>
cc: nanog@merit.edu
In-Reply-To: <343a64d10.231f@databus.databus.com>

On Tue, 7 Oct 1997, Barney Wolff wrote:
> > Date: Tue, 7 Oct 1997 12:04:27 -0400 (EDT)
> > From: Alex Przekupowski <oop@idt.net>
> > 
> > On the MAX's that I have set up, I log that info to syslog (Local 7), and
> > can pull it up at will.  If you need a hand, just let me know.  By
> > combining the syslog output, and the RADIUS accounting logs, we can
> > definately prove at least the home address of the attacker.
> 
> How are you providing source address assurance, on either a MAX or a TNT?
> My understanding, which may well be flawed, is that the only way is with
> a filter.  I have heard claims, which may also be flawed, that filters
> have a severe performance impact on MAX and TNT.
> 
> Without source address assurance, how do you know that the packets are
> actually coming from the user who was assigned that address at that time?
> 
> Barney Wolff  <barney@databus.com>

What he means is that he can provide the number of the person who dialed
into his equipment.  That information can be given to you on your PRI, and
reported in both radius accounting and syslog.

Joe Shaw - jshaw@insync.net
NetAdmin - Insync Internet Services


home help back first fref pref prev next nref lref last post