[169400] in North American Network Operators' Group
RE: Filter NTP traffic by packet size?
daemon@ATHENA.MIT.EDU (Phil Bedard)
Sun Feb 23 12:26:34 2014
From: Phil Bedard <bedard.phil@gmail.com>
Date: Sun, 23 Feb 2014 09:26:09 -0800
To: Mikael Abrahamsson <swmike@swm.pp.se>, Chris Laffin <claffin@peer1.com>
Cc: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Sun, 23 Feb 2014, Chris Laffin wrote:
> Ive talked to some major peering exchanges and they refuse to take any action. Possibly if the requests come from many peering participants it will be taken more seriously?
If only there was more focus on the BCP38 offenders who are the real root
cause of this problem, I would be more happy.
I would be more impressed if the IXes would start to use their sFlow
capabilities to find out what IX ports the NTP queries are coming to
backtrace the traffic to the BCP38 offendors than try to block the NTP
packets resulting from these src address forged queries.
--
Mikael Abrahamsson email: swmike@swm.pp.se