[162698] in North American Network Operators' Group
Re: Tier1 blackholing policy?
daemon@ATHENA.MIT.EDU (Tassos Chatzithomaoglou)
Tue Apr 30 11:24:47 2013
Date: Tue, 30 Apr 2013 18:22:14 +0300
From: Tassos Chatzithomaoglou <achatz@forthnetgroup.gr>
To: Jared Mauch <jared@puck.nether.net>, Chris Boyd <cboyd@gizmopartners.com>
In-Reply-To: <1F4BFF91-3B1E-4B27-98C8-0515E12B93E6@puck.nether.net>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
I think blocking phishing sites vs blocking ddos require a different approach.
--
Tassos
Jared Mauch wrote on 30/04/2013 18:11:
> Sounds like a no win situation. Either you let the bad guys do things or get complaints you blocked the bad guys.
>
> Jared Mauch
>
> On Apr 30, 2013, at 11:07 AM, Chris Boyd <cboyd@gizmopartners.com> wrote:
>
>> On Tue, 2013-04-30 at 10:59 -0400, ML wrote:
>>> 1) Do nothing - They're supposed deliver any and all bits
>>> (Disregarding
>>> a DoS or similiar situation which impedes said network)
>>> 2) Prefix filter - Don't be a party (at least in one direction) to the
>>> bad actors traffic.
>> 3 - Deliver all packets unless I've signed up for an enhanced security
>> offering?
>>
>> --Chris
>>
>
>