[129358] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: ISP port blocking practice

daemon@ATHENA.MIT.EDU (William Herrin)
Fri Sep 3 11:24:22 2010

In-Reply-To: <3A97A2BA-C9FE-4554-908D-AD3986CC3E1B@senie.com>
From: William Herrin <bill@herrin.us>
Date: Fri, 3 Sep 2010 11:23:00 -0400
To: Daniel Senie <dts@senie.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Thu, Sep 2, 2010 at 11:04 PM, Daniel Senie <dts@senie.com> wrote:
> Ingress filtering is the correct tool for the job.

Not really. Ingress filtering only ever protected you from being the
source of spooding attacks, not the destination. The point of Zhiyun's
results is that it doesn't fully protect you from being the source
either.

Frankly, Zhiyun offers the first truly rational case I've personally
seen for packet filtering based on the TCP source port. You should
give his work more careful scrutiny.

Regards,
Bill Herrin


--=20
William D. Herrin ................ herrin@dirtside.com=A0 bill@herrin.us
3005 Crane Dr. ...................... Web: <http://bill.herrin.us/>
Falls Church, VA 22042-3004


home help back first fref pref prev next nref lref last post