[27069] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Yahoo! Lessons Learned

daemon@ATHENA.MIT.EDU (Dan Hollis)
Tue Feb 8 23:35:14 2000

Date: Tue, 8 Feb 2000 20:32:11 -0800 (PST)
From: Dan Hollis <goemon@sasami.anime.net>
To: Vadim Antonov <avg@kotovnik.com>
Cc: dts@senie.com, nanog@nanog.org
In-Reply-To: <200002090424.UAA08017@kitty.kotovnik.com>
Message-ID: <Pine.LNX.4.10.10002082030110.21109-100000@anime.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Tue, 8 Feb 2000, Vadim Antonov wrote:
> Yep. Actually, tier-1 ISPs can write the requirement for reverse-path source
> IP address verification on customer access circuits into their peering agreements.
> An enforcement can take a form of penalties per verified incident of forged source
> address attack originating in peer's network.

The best penalty of all - simply pulling customer's plug till they fix
their network, with a repeat offense resulting in permanent disconnection.

-Dan



home help back first fref pref prev next nref lref last post