[32040] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DoS attacks, NSPs unresponsiveness

daemon@ATHENA.MIT.EDU (John Payne)
Fri Nov 3 21:51:10 2000

Date: Fri, 3 Nov 2000 18:48:57 -0800
From: John Payne <john@sackheads.org>
To: nanog@merit.edu
Message-ID: <20001103184857.B9873@haybaler.sackheads.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.BSO.4.21.0011022218210.23003-100000@dawoozie.pulltheplug.com>; from dies@pulltheplug.com on Thu, Nov 02, 2000 at 10:29:51PM -0500
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, Nov 02, 2000 at 10:29:51PM -0500, dies wrote:
> 	This topic is continously covered (as you can tell) so I'm not
> sure where to go from here.  I've been looking into starting a BGP speaker
> that announces the top 4000 smurf amplifiers from my list and the top 2000
> from netscan, which in turn can be pushed to null0 or discard.  This would
> prevent one from actually attacking from a network participating in this
> BGP session.  I've tested it and it's working on a couple smaller ISPs as
> we speak.  My major problem is getting some Tier-1's to go for
> it...Anyways I guess larger attacks than last Feb. will have to happen to
> get something done?  Let's hope not...

Oh, do tell... how does the fact that you null route smurf amps stop those
amps attacking you?

-- 
John Payne      http://www.sackheads.org/jpayne/    john@sackheads.org
http://www.sackheads.org/uce/                    Fax: +44 870 0547954
        To send me mail, use the address in the From: header


home help back first fref pref prev next nref lref last post