[180117] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [SECURITY] Application layer attacks/DDoS attacks

daemon@ATHENA.MIT.EDU (Christopher Morrow)
Sun May 24 23:01:55 2015

X-Original-To: nanog@nanog.org
In-Reply-To: <CAJL_ZMMsQe7fKGULPfjJdsMkSJRWavPXf7w=t2OXQqh=7CsHtQ@mail.gmail.com>
Date: Sun, 24 May 2015 23:01:50 -0400
From: Christopher Morrow <morrowc.lists@gmail.com>
To: jim deleskie <deleskie@gmail.com>
Cc: NANOG list <nanog@nanog.org>, Ramy Hashish <ramy.ihashish@gmail.com>
Errors-To: nanog-bounces@nanog.org

On Sat, May 23, 2015 at 9:12 PM, jim deleskie <deleskie@gmail.com> wrote:
>> However, the trusted network initiative might be a good approach to start
>> influencing operators to apply anti-spoofing mechanisms.
>>

explain how you think the 'trusted network initiative' matters in the slightest?

-chris

home help back first fref pref prev next nref lref last post