[58396] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Using Policy Routing to stop DoS attacks

daemon@ATHENA.MIT.EDU (Stefan Mink)
Mon May 12 05:56:29 2003

Date: Mon, 12 May 2003 11:55:52 +0200
From: Stefan Mink <mink@schlund.net>
To: "Christopher L. Morrow" <chris@UU.NET>
Cc: Haesu <haesu@towardex.com>, jtk@aharp.is-net.depaul.edu,
	nanog@merit.edu
In-Reply-To: <Pine.GSO.4.33.0303251654050.16800-100000@rampart.argfrp.us.uu.net>
Errors-To: owner-nanog-outgoing@merit.edu



--2fowzm2eVyDiEwGH
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Tue, Mar 25, 2003 at 04:58:59PM +0000, Christopher L. Morrow wrote:
> you could hold blackhole routes for these destinations in your route table
> (local or bgp) So long as the destination for the source is bad (null for
> instance) the traffic would get dropped. I believe the proper terms from
> cisco for this are: "So long as the adjacency is invalid" ...

is there a way to make this source-blackhole-routing work=20
on J's too (does this work with discard-routes too)?

   tschuess
             Stefan
--=20
Stefan Mink, Schlund+Partner AG (AS 8560)
Primary key fingerprint: 389E 5DC9 751F A6EB B974  DC3F 7A1B CF62 F0D4 D2BA

--2fowzm2eVyDiEwGH
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE+v2+oehvPYvDU0roRAsHDAJ9kEHAlSI5UsxwR+7j72I4BgWXQNACcCxG0
mF1pvsFkeIzn2Yu49fVZDwk=
=HhSc
-----END PGP SIGNATURE-----

--2fowzm2eVyDiEwGH--

home help back first fref pref prev next nref lref last post