[39082] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: peering requirements (Re: DDOS anecdotes)

daemon@ATHENA.MIT.EDU (Przemyslaw Karwasiecki)
Tue Jun 26 14:01:08 2001

From: "Przemyslaw Karwasiecki" <karwas@ifxcorp.com>
To: "Paul Vixie" <vixie@mfnx.net>, <nanog@merit.edu>
Date: Tue, 26 Jun 2001 13:56:35 -0400
Message-ID: <AAELKMGHPOPGPCJPPCLMMEHGCHAA.karwas@ifxcorp.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
In-Reply-To: <g3ithjcf24.fsf@redpaul.mfnx.net>
Errors-To: owner-nanog-outgoing@merit.edu


But please don't forget that in this particular DDoS event
there was no IP spoofing.

So anti-spoofing precautions, either on administrative or technical
level, would be useless in this case.

And this case is not so untypical.

my .002$

Przemek

-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu]On Behalf Of
Paul Vixie
Sent: Tuesday, June 26, 2001 1:44 PM
To: nanog@merit.edu
Subject: Re: peering requirements (Re: DDOS anecdotes)



Following up on my own post:

vixie@mfnx.net (Paul Vixie) writes:

> Recommendation: upgrade your peering requirements to include language
like:
> ...

Several folks here talked about technical implementation aspects (RPF, etc)
and a few told me privately that peering was a sales/marketing activity at
this stage of the game.

This either means that upgrading the general level of peering agreement is
not possible, or that the people I should be discussing it with don't read
NANOG.

This echos what I learnt at Stephen's BOF in Phoenix.


home help back first fref pref prev next nref lref last post