[52669] in North American Network Operators' Group
Re: Who does source address validation? (was Re: what's that smell?)
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Oct 8 11:54:09 2002
To: nanog@merit.edu
In-Reply-To: Your message of "Tue, 08 Oct 2002 11:09:10 EDT."
<Pine.GSO.4.40.0210081056310.12533-100000@clifden.donelan.com>
From: Valdis.Kletnieks@vt.edu
Date: Tue, 08 Oct 2002 11:51:30 -0400
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_1093340050P
Content-Type: text/plain; charset=us-ascii
On Tue, 08 Oct 2002 11:09:10 EDT, Sean Donelan said:
> http://www.ipservices.att.com/backbone/techspecs.cfm
>
> AT&T has also implemented security features directly into the backbone.
> IP Source Address Assurance is implemented at every customer
> point-of-entry to guard against hackers. AT&T examines the source
> address of every inbound packet coming from customer connections to
> ensure it matches the IP address we expect to see on that packet. This
> means that the AT&T IP Backbone is RFC2267-compliant.
Thank you, AT&T.
--==_Exmh_1093340050P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQE9ov8CcC3lWbTT17ARAtTOAJ486eSYIGUV7zh83lcIWBsIMibSCACdF7d0
Xx9X/6cy90LQQ5FZV7PsOCI=
=3xAK
-----END PGP SIGNATURE-----
--==_Exmh_1093340050P--