[178956] in North American Network Operators' Group
Re: Getting hit hard by CHINANET
daemon@ATHENA.MIT.EDU (Paul S.)
Wed Mar 18 01:31:56 2015
X-Original-To: nanog@nanog.org
Date: Wed, 18 Mar 2015 14:31:52 +0900
From: "Paul S." <contact@winterei.se>
To: nanog@nanog.org
In-Reply-To: <55090C8A.1050804@seacom.mu>
Errors-To: nanog-bounces@nanog.org
All 6 of my upstreams (Most of them tier 1s, except Internap which is a
tier 3?) have cooperated just fine in blocking problematic IPs if needed
in emergencies.
I did not have to argue.
On 3/18/2015 午後 02:26, Mark Tinka wrote:
>
>
> On 18/Mar/15 04:13, Roland Dobbins wrote:
>>
>>
>> Also, asking your upstreams/peers to block traffic sourced from this
>> IP to your netblock(s) on their networks.
>
> I'm actually curious how many transit providers would implement data
> plane filters on their side to block source traffic bound for their
> downstreams.
>
> Personally, as a transit provider, I'm less inclined to filtering
> traffic in any way; impact to hardware e.t.c. notwithstanding...
>
> Perhaps times are changing.
>
> Mark.