[74714] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BCP38 making it work, solving problems

daemon@ATHENA.MIT.EDU (Christopher L. Morrow)
Tue Oct 12 13:24:37 2004

Date: Tue, 12 Oct 2004 17:16:25 +0000 (GMT)
From: "Christopher L. Morrow" <christopher.morrow@mci.com>
In-reply-to: <BD91597F.BC71%bora@cisco.com>
To: Bora Akyol <bora@cisco.com>
Cc: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu



On Tue, 12 Oct 2004, Bora Akyol wrote:

> Excerpt from the text quoted above:
>
>    2.3. For a DDoS attack to succeed more than once, the launch points must
>    remain anonymous.  Therefore, forged IP source addresses are used.  From
>    the victim's point of view, a DDoS attack seems to come from everywhere
>    at once, even from many IP addresses that are unallocated or otherwise
>    invalid.
>
> How many people have seen "forged" spoofed IP addresses being used
> for DOS attacks lately?

it does still happen... I've not run the numbers for our reactions to say
'50% spoofed/50% non-spoofed' but it certainly seems like 'more' are
non-spoofed lately. This could be a simple swing of the pendulum, or other
'better' things like more people egress filtering.

-Chris

home help back first fref pref prev next nref lref last post