[27143] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Yahoo offline because of attack (was: Yahoo network outage)

daemon@ATHENA.MIT.EDU (Jared Mauch)
Wed Feb 9 16:55:17 2000

Date: Wed, 9 Feb 2000 16:53:00 -0500
From: Jared Mauch <jared@puck.Nether.net>
To: Dan Hollis <goemon@sasami.anime.net>
Cc: Travis Pugh <tpugh@shore.net>, lucifer@lightbearer.com,
	nanog@merit.edu
Message-ID: <20000209165259.I20362@puck.nether.net>
Mail-Followup-To: Dan Hollis <goemon@sasami.anime.net>,
	Travis Pugh <tpugh@shore.net>, lucifer@lightbearer.com,
	nanog@merit.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
In-Reply-To: <Pine.LNX.4.10.10002091308540.675-100000@anime.net>; from goemon@sasami.anime.net on Wed, Feb 09, 2000 at 01:09:29PM -0800
Errors-To: owner-nanog-outgoing@merit.edu


	I firmly believe that the security groups will be working closer
together after this week than ever before.  I spent some time talking
to the C&W security group today about a problem related to the stream.c
exploit being used.

	Is anyone dropping traffic from src/dst ips that are currently
reserved and do not have any allocations out of them (such as 60/8
for example) anywhere inside their network?  I know that MAPS
has gone and done something similar to this as it relates to
their rbl, but I am not aware of any providers doing anything but route
filtering on these prefixes, not packet filtering.

	- jared

On Wed, Feb 09, 2000 at 01:09:29PM -0800, Dan Hollis wrote:
> 
> On Wed, 9 Feb 2000, Travis Pugh wrote:
> > ... assuming a minimal amount of cooperation between upstream provider and
> 
> Theres that "c" word again. It just isnt going to happen.
> 
> -Dan
> 

-- 
Jared Mauch  | pgp key available via finger from jared@puck.nether.net
clue++;      | http://puck.nether.net/~jared/  My statements are only mine.
END OF LINE  |


home help back first fref pref prev next nref lref last post