[50571] in North American Network Operators' Group
Re: If you have nothing to hide
daemon@ATHENA.MIT.EDU (Len Rose)
Mon Aug 5 11:04:16 2002
Date: Mon, 5 Aug 2002 11:03:44 -0400
From: Len Rose <len@netsys.com>
To: bdragon@gweep.net
Cc: nanog@merit.edu
In-Reply-To: <20020805145145.31714.qmail@sidehack.sat.gweep.net>; from bdragon@gweep.net on Mon, Aug 05, 2002 at 10:51:45AM -0400
Errors-To: owner-nanog-outgoing@merit.edu
Of course, I mean denial of service attacks using source routing, i.e. made
possible by use of same. I guess I need to be semantically perfect and
I don't always have a wonderful command of the english language it seems,
but please grant that I'm not stupid.
Thanks
On Mon, Aug 05, 2002 at 10:51:45AM -0400, bdragon@gweep.net wrote:
[snip]
> denial of service based upon source routing? I hadn't heard of any denial
> of service attacks of that sort.
>
> Disabling source-routing is like filtering icmp, sure you might block
> a few abuses, but more often than not, you are throwing out legitimate
> traffic.