[174807] in North American Network Operators' Group
Re: large BCP38 compliance testing
daemon@ATHENA.MIT.EDU (Roland Dobbins)
Thu Oct 2 09:04:27 2014
X-Original-To: nanog@nanog.org
From: Roland Dobbins <rdobbins@arbor.net>
In-Reply-To: <542D4AEF.5040907@pubnix.net>
Date: Thu, 2 Oct 2014 20:04:12 +0700
To: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
On Oct 2, 2014, at 7:54 PM, Alain Hebert <ahebert@pubnix.net> wrote:
> My mindset was set on DDoS and not C&C/SPAM/etc.
My point is that the ability to launch reflection/amplification DDoS =
attacks (as well as spoofed SYN-floods, and so forth) is dependent upon =
the ability to spoof packets, and that my hunch is that there're a =
relatively small number of networks from which the spoofed attack =
traffic is emitted.
----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>
Equo ne credite, Teucri.
-- Laoco=F6n