[149484] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: UDP port 80 DDoS attack

daemon@ATHENA.MIT.EDU (Jeff Wheeler)
Mon Feb 6 02:34:17 2012

In-Reply-To: <4F2F4423.8040803@gmail.com>
Date: Mon, 6 Feb 2012 02:33:29 -0500
From: Jeff Wheeler <jsw@inconcepts.biz>
To: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Sun, Feb 5, 2012 at 10:08 PM, Steve Bertrand
<steve.bertrand@gmail.com> wrote:
> This is so very easily automated. Even if you don't actually want to trig=
ger
> the routes automatically, finding the sources you want to blackhole is as

What transit providers are doing flow-spec, or otherwise, to allow
their downstreams to block malicious traffic by SOURCE address?

--=20
Jeff S Wheeler <jsw@inconcepts.biz>
Sr Network Operator=A0 /=A0 Innovative Network Concepts


home help back first fref pref prev next nref lref last post