[174807] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: large BCP38 compliance testing

daemon@ATHENA.MIT.EDU (Roland Dobbins)
Thu Oct 2 09:04:27 2014

X-Original-To: nanog@nanog.org
From: Roland Dobbins <rdobbins@arbor.net>
In-Reply-To: <542D4AEF.5040907@pubnix.net>
Date: Thu, 2 Oct 2014 20:04:12 +0700
To: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org


On Oct 2, 2014, at 7:54 PM, Alain Hebert <ahebert@pubnix.net> wrote:

>    My mindset was set on DDoS and not C&C/SPAM/etc.

My point is that the ability to launch reflection/amplification DDoS =
attacks (as well as spoofed SYN-floods, and so forth) is dependent upon =
the ability to spoof packets, and that my hunch is that there're a =
relatively small number of networks from which the spoofed attack =
traffic is emitted.

----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

                   Equo ne credite, Teucri.

    		   	  -- Laoco=F6n


home help back first fref pref prev next nref lref last post