[169400] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Filter NTP traffic by packet size?

daemon@ATHENA.MIT.EDU (Phil Bedard)
Sun Feb 23 12:26:34 2014

From: Phil Bedard <bedard.phil@gmail.com>
Date: Sun, 23 Feb 2014 09:26:09 -0800
To: Mikael Abrahamsson <swmike@swm.pp.se>, Chris Laffin <claffin@peer1.com>
Cc: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Sun, 23 Feb 2014, Chris Laffin wrote:

> Ive talked to some major peering exchanges and they refuse to take any action. Possibly if the requests come from many peering participants it will be taken more seriously?

If only there was more focus on the BCP38 offenders who are the real root
cause of this problem, I would be more happy.

I would be more impressed if the IXes would start to use their sFlow
capabilities to find out what IX ports the NTP queries are coming to
backtrace the traffic to the BCP38 offendors than try to block the NTP
packets resulting from these src address forged queries.

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se


home help back first fref pref prev next nref lref last post