[36190] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: dsl providers that will route /24

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Thu Mar 29 18:44:22 2001

Message-Id: <200103292320.f2TNKEA13823@foo-bar-baz.cc.vt.edu>
To: David Schwartz <davids@webmaster.com>
Cc: "Eric A. Hall" <ehall@ehsco.com>, nanog@nanog.org
In-Reply-To: Your message of "Thu, 29 Mar 2001 15:08:24 PST."
             <NCBBLIEPOCNJOAEKBEAKAEILOBAA.davids@webmaster.com> 
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-503390890P";
	 micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Thu, 29 Mar 2001 18:20:14 -0500
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_-503390890P
Content-Type: text/plain; charset=us-ascii

On Thu, 29 Mar 2001 15:08:24 PST, David Schwartz said:
> 	So long as spoofing is possible, you cannot be sure where an attack came

And spoofing is possible because people don't filter.

> from unless you can either log it at its source or trace the stream to its
> source. That's the problem, and filters don't fix that.

So we shouldn't filter at the source because we can't fix the problem unless
we're filtering at the source?

Or are you saying that because seat belts fail 1% of the time, we shouldn't
use them to help in the other 99% of the crashes?




--==_Exmh_-503390890P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
Comment: Exmh version 2.2 06/16/2000

iQA/AwUBOsPDLnAt5Vm009ewEQIVzACghc33j4G3mhXrZzHC8t3HnK5iDzAAoP5P
9gu5ax9bRoRjmdKk/9MozJ9L
=f9dw
-----END PGP SIGNATURE-----

--==_Exmh_-503390890P--


home help back first fref pref prev next nref lref last post