[151665] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BCP38 Deployment

daemon@ATHENA.MIT.EDU (goemon@anime.net)
Wed Mar 28 12:44:31 2012

Date: Wed, 28 Mar 2012 09:41:37 -0700 (PDT)
From: goemon@anime.net
To: David Conrad <drc@virtualized.org>
In-Reply-To: <D57C460F-FEC9-4E63-91F0-171D6A9A3C2A@virtualized.org>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Wed, 28 Mar 2012, David Conrad wrote:
> Actually, given the uptick in spoofing-based DoS attacks, the ease in 
> which such attacks can be generated, recent high profile targets of said 
> attacks, and the full-on money pumping freakout about anything with 
> "cyber-" tacked on the front, I suspect a likely outcome will be 
> proposals for legislation forcing ISPs to do something like BCP38.

Exactly.

Either do it voluntarily or it will be done for you involuntarily at the 
federal level and you will have nobody but yourselves to blame.

The choice is yours.

-Dan


home help back first fref pref prev next nref lref last post