[39344] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: GRC rides again...

daemon@ATHENA.MIT.EDU (Roeland Meyer)
Tue Jul 3 01:07:14 2001

Message-ID: <EA9368A5B1010140ADBF534E4D32C7280259AB@condor.mhsc.com>
From: Roeland Meyer <rmeyer@mhsc.com>
To: 'Ron Buchalski' <rbuchals@hotmail.com>,
	davei@biohazard.demon.digex.net, Roeland Meyer <rmeyer@mhsc.com>
Cc: rdobbins@netmore.net, DaveHowe@gmx.co.uk, nanog@merit.edu
Date: Mon, 2 Jul 2001 22:10:49 -0700 
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Errors-To: owner-nanog-outgoing@merit.edu


> From: Ron Buchalski [mailto:rbuchals@hotmail.com]
> Sent: Monday, July 02, 2001 7:52 AM

> It may be possible for the features of qos to help limit the 
> extent of the 
> attack, but with no predictability of where the attack 
> sources or attack 
> destinations are, you'd either need to apply qos when the 
> attack occurs 
> (reactive), or deploy it EVERYWHERE, on ALL provider's 
> networks (intensely 
> proactive).  I doubt that anyone has the time or effort to 
> deploy worldwide 
> qos in order to stop random (and small, compared to overall 
> traffic) dos 
> attacks.

This WAS the idea, thanks for pointing out the weakness. Basically, yet
another means to filter. But, too much work to implement. According to this,
it wouldn't scale.

home help back first fref pref prev next nref lref last post