[162732] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Mitigating DNS amplification attacks

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Tue Apr 30 20:45:37 2013

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Wed, 1 May 2013 00:45:25 +0000
In-Reply-To: <CDA5DB79.10DEB%tstpierre@iweb.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On May 1, 2013, at 7:42 AM, Thomas St-Pierre wrote:

> As for BCP38, I would love to stop the spoofed packets, however with them=
 coming from our upstreams, (Level3, Cogent, Tata, etc) I don't see how we =
can.

Contact them on a case-by-case basis to report the spoofed traffic used to =
stimulate the servers into responding, including the layer-4 classification=
 criteria, traffic rates, and timestamps available via flow telemetry.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

	  Luck is the residue of opportunity and design.

		       -- John Milton



home help back first fref pref prev next nref lref last post