[39520] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: DDOS prevention offensive.

daemon@ATHENA.MIT.EDU (Roeland Meyer)
Thu Jul 12 17:52:45 2001

Message-ID: <EA9368A5B1010140ADBF534E4D32C728025A15@condor.mhsc.com>
From: Roeland Meyer <rmeyer@mhsc.com>
To: 'Jason Slagle' <raistlin@tacorp.net>,
	Bill Larson <blarson@compu.net>
Cc: Rob Thomas <robt@cymru.com>, nanog@merit.edu
Date: Thu, 12 Jul 2001 14:57:29 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Errors-To: owner-nanog-outgoing@merit.edu



> From: Jason Slagle [mailto:raistlin@tacorp.net]
> Sent: Thursday, July 12, 2001 10:19 AM
> 
> On Thu, 12 Jul 2001, Bill Larson wrote:
> 
> > Well to sum it up in one sentence. If you eliminate the 
> bogus addresses, you
> > can then target the actual zombie machines used to attack 
> the site and
> > eventually eliminate the risk via patching or null route 
> them. So filtering
> > bogus addresses, non-routable addresses, and the addresses, 
> which do not
> > belong to your net blocks, would serve to combat the denial 
> of service
> > attacks.
> 
> 
> I believe the attacks in question are actually non-spoofed.
> 
> It's getting the source networks to remove the boxes that is the
> problem.  Most of them are .edu.

Aha! I knew there was a reason that I filter EDU <g>.

home help back first fref pref prev next nref lref last post