[63512] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: CCO/cisco.com issues.

daemon@ATHENA.MIT.EDU (Matt)
Tue Oct 7 00:40:56 2003

Date: Mon, 06 Oct 2003 23:43:04 -0500
From: "Matt" <acheron@qwest.net>
To: nanog@merit.edu
In-Reply-To: <000e01c38c6a$ec53c200$0200000a@netsec.net>
Errors-To: owner-nanog-outgoing@merit.edu


As the bandwidth ramps up on the access side, this problem is only going 
to become more and more prevalent (as if it's not already enough of a 
problem).  While I don't think filtering is the silver bullet, it can 
certainly help at times.  I think some of the larger watch sites (eg 
SANS, etc.) out there have the right idea - even though reactive in 
nature, almost real-time dissemination of attack vectors and trending of 
  methods goes a long way towards slowing down some of these attacks. 
Unfortunately, these single target attacks, such as attacks on Cisco, 
Ebay, Yahoo, etc. cannot be entirely thwarted if the attacker(s) is/are 
determined enough.  We could go down the client side discussion (you 
know, the one about certain software vendors, etc.) but that topic has 
already been covered in great length.



home help back first fref pref prev next nref lref last post