[168971] in North American Network Operators' Group
Re: BCP38 (was: Re: Why won't providers source-filter attacks?
daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Fri Feb 7 16:07:48 2014
From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Fri, 7 Feb 2014 21:07:17 +0000
In-Reply-To: <A3E596F6-04B6-4DEB-9589-B0767DDF2706@corp.arin.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Feb 8, 2014, at 3:37 AM, John Curran <jcurran@arin.net> wrote:
> It's also true that if a sizable group of network operators were to actua=
lly deploy source address validation (thus proving that it really is a reas=
onable approach and doesn't carry too much operational or vendor implicatio=
ns), then it would be quite reasonable for those operators to bring the res=
ults to NANOG and get it recognized as a best current operating practice fo=
r networks of similar design/purpose.
Many already do - including operators of very large networks. There are op=
erational, vendor, and topological considerations which mean that it's achi=
eved utilizing various mechanisms in different scenarios.
-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>
Luck is the residue of opportunity and design.
-- John Milton