[6599] in North American Network Operators' Group
Re: NAP/ISP Saturation WAS: Re: Exchanges that matter...
daemon@ATHENA.MIT.EDU (Jon Zeeff)
Sat Dec 21 09:55:00 1996
From: jon@branch.net (Jon Zeeff)
To: blh@nol.net (Brett L. Hawn)
Date: Sat, 21 Dec 1996 09:27:59 -0500 (EST)
Cc: hannan@UU.NET, davids@wiznet.net, tli@jnx.com, nanog@merit.edu
In-Reply-To: <Pine.GSO.3.95.961220194855.9659D-100000@dazed.nol.net> from "Brett L. Hawn" at Dec 20, 96 07:55:10 pm
Perhaps this has been said before, but it sounds like the world needs
a "spoofed packet discovery protocol". Something that would allow
authorized users to query a router and ask it questions about where,
etc packets destined for a given ip address are coming from. With
this in place, one could trace back spoofers as quickly as we can
currently trace normal routing (traceroute).
> hard on the eyes after a while but.. I'm willing to believe that if you make
> enough examples of busting the abusers word will get around. Granted there