[39103] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: peering requirements (Re: DDOS anecdotes)

daemon@ATHENA.MIT.EDU (Paul A Vixie)
Tue Jun 26 15:30:39 2001

Message-Id: <200106261930.MAA44543@redpaul.mfnx.net>
To: nanog@merit.edu
In-Reply-To: Message from "Przemyslaw Karwasiecki" <karwas@ifxcorp.com> 
   of "Tue, 26 Jun 2001 13:56:35 EDT." <AAELKMGHPOPGPCJPPCLMMEHGCHAA.karwas@ifxcorp.com> 
Date: Tue, 26 Jun 2001 12:30:06 -0700
From: Paul A Vixie <vixie@mfnx.net>
Errors-To: owner-nanog-outgoing@merit.edu


> But please don't forget that in this particular DDoS event
> there was no IP spoofing.
> 
> So anti-spoofing precautions, either on administrative or technical
> level, would be useless in this case.
> 
> And this case is not so untypical.

that doesn't matter to me.  i, and people i'm various close to, am attacked
several times daily.  sometimes in a hard way, sometimes in a soft way, but
almost always using spoofed addresses.  tracking these hop by hop using mac
addresses at exchange points only works if the stream is steady.  it's not.

> my .002$

i was not basing my recommendation for a general peering agreement upgrade
on any specific attack.  it's the pattern of attacks over the last decade
that's got me bugged.  any angry teenager with a $300 openbsd machine can
bring down any part of the internet they're angry at.  with impunity.

home help back first fref pref prev next nref lref last post