[36190] in North American Network Operators' Group
Re: dsl providers that will route /24
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Thu Mar 29 18:44:22 2001
Message-Id: <200103292320.f2TNKEA13823@foo-bar-baz.cc.vt.edu>
To: David Schwartz <davids@webmaster.com>
Cc: "Eric A. Hall" <ehall@ehsco.com>, nanog@nanog.org
In-Reply-To: Your message of "Thu, 29 Mar 2001 15:08:24 PST."
<NCBBLIEPOCNJOAEKBEAKAEILOBAA.davids@webmaster.com>
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-503390890P";
micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Thu, 29 Mar 2001 18:20:14 -0500
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_-503390890P
Content-Type: text/plain; charset=us-ascii
On Thu, 29 Mar 2001 15:08:24 PST, David Schwartz said:
> So long as spoofing is possible, you cannot be sure where an attack came
And spoofing is possible because people don't filter.
> from unless you can either log it at its source or trace the stream to its
> source. That's the problem, and filters don't fix that.
So we shouldn't filter at the source because we can't fix the problem unless
we're filtering at the source?
Or are you saying that because seat belts fail 1% of the time, we shouldn't
use them to help in the other 99% of the crashes?
--==_Exmh_-503390890P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
Comment: Exmh version 2.2 06/16/2000
iQA/AwUBOsPDLnAt5Vm009ewEQIVzACghc33j4G3mhXrZzHC8t3HnK5iDzAAoP5P
9gu5ax9bRoRjmdKk/9MozJ9L
=f9dw
-----END PGP SIGNATURE-----
--==_Exmh_-503390890P--