[47587] in North American Network Operators' Group
Re: Effective ways to deal with DDoS attacks?
daemon@ATHENA.MIT.EDU (Ralph Doncaster)
Mon May 6 19:45:14 2002
Date: Mon, 6 May 2002 19:39:44 -0400 (EDT)
From: Ralph Doncaster <ralph@istop.com>
To: "Valdis.Kletnieks@vt.edu" <Valdis.Kletnieks@vt.edu>
Cc: "nanog@merit.edu" <nanog@merit.edu>
In-Reply-To: <200205062334.g46NYdQn027813@foo-bar-baz.cc.vt.edu>
Message-ID: <Pine.LNX.4.21.0205061939130.627-100000@cpu1693.adsl.bellglobal.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
On Mon, 6 May 2002, Valdis.Kletnieks@vt.edu wrote:
> On Mon, 06 May 2002 19:04:11 EDT, Ralph Doncaster said:
>
> > IP Tunneling - it often makes more sense to send packets out that have a
> > source address reachable only through the tunnel.
>
> But aren't those source addresses hidden *inside* the encapsulation, and
> what's visible to routers are the source/dest IPs of the tunnel itself?
What I'm saying is that if something comes in through the tunnel, the
shortest route to the destination is often not to go back out through the
tunnel.