[161743] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BCP38 - Internet Death Penalty

daemon@ATHENA.MIT.EDU (Darius Jahandarie)
Tue Mar 26 11:31:46 2013

In-Reply-To: <43218.1364310365@turing-police.cc.vt.edu>
From: Darius Jahandarie <djahandarie@gmail.com>
Date: Tue, 26 Mar 2013 11:19:36 -0400
To: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

(Mobile device)

On Mar 26, 2013, at 11:06 AM,Valdis.Kletnieks@vt.edu wrote:

> On Tue, 26 Mar 2013 10:51:45 -0400, Jay Ashworth said:
>=20
>> Do we need to define a flag day, say one year hence, and start making the=

>> sales pitch to our Corporate Overlords that we need to apply the IDP to
>> edge connections which cannot prove they've implemented BCP38 (or at very=

>> least, the source address spoofing provisions thereof)?
>=20
> How would one prove this?  (In particular, consider the test "have them
> download the spoofer code from SAIL and run it" - I'm positive there will
> be sites that will put in a /32 block for the test machine so it "fails"
> to spoof but leave it open for the rest of the net).

Well, I'm not sure this is what's being suggested by Jay, but many peering a=
greements/policies have something in them that say "prevent spoofing to best=
 effort". Such statements could be strengthened in a global effort, and then=
 spoofed source addresses could lead to depeering much faster/harder than wh=
at happens today. It would be reactionary rather than proactive, but still b=
etter than what we have now where spoofing is kind of like "it can't be help=
ed".

--=20
Darius Jahandarie=

home help back first fref pref prev next nref lref last post