[68438] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Counter DoS

daemon@ATHENA.MIT.EDU (Petri Helenius)
Thu Mar 11 17:01:33 2004

Date: Thu, 11 Mar 2004 23:59:34 +0200
From: Petri Helenius <pete@he.iki.fi>
To: Deepak Jain <deepak@ai.net>
Cc: Gregory Taylor <greg@xwb.com>, Rachael Treu <rara@navigo.com>,
	nanog@merit.edu
In-Reply-To: <4050D5AC.30702@ai.net>
Errors-To: owner-nanog-outgoing@merit.edu


Deepak Jain wrote:

>
>
> If you wanted to do that, wouldn't the firewall just need 
> directed-broadcast left open or emulate similar behavior, or even 
> turning ip unreachables back on?
>
> Flooding pipes accidentally is easy enough. Now people are selling 
> products to do it deliberately.
>
Maybe there is a lesson to be learned from many RBL operators. To make 
sure, just send packets to the whole /24 or /16 you got an "attack" 
packet from.

Pete



home help back first fref pref prev next nref lref last post