[178956] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Getting hit hard by CHINANET

daemon@ATHENA.MIT.EDU (Paul S.)
Wed Mar 18 01:31:56 2015

X-Original-To: nanog@nanog.org
Date: Wed, 18 Mar 2015 14:31:52 +0900
From: "Paul S." <contact@winterei.se>
To: nanog@nanog.org
In-Reply-To: <55090C8A.1050804@seacom.mu>
Errors-To: nanog-bounces@nanog.org

All 6 of my upstreams (Most of them tier 1s, except Internap which is a 
tier 3?) have cooperated just fine in blocking problematic IPs if needed 
in emergencies.

I did not have to argue.

On 3/18/2015 午後 02:26, Mark Tinka wrote:
>
>
> On 18/Mar/15 04:13, Roland Dobbins wrote:
>>
>>
>> Also, asking your upstreams/peers to block traffic sourced from this 
>> IP to your netblock(s) on their networks.
>
> I'm actually curious how many transit providers would implement data 
> plane filters on their side to block source traffic bound for their 
> downstreams.
>
> Personally, as a transit provider, I'm less inclined to filtering 
> traffic in any way; impact to hardware e.t.c. notwithstanding...
>
> Perhaps times are changing.
>
> Mark.


home help back first fref pref prev next nref lref last post