[83059] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DDoS attacks, spoofed source addresses and adjusted TTLs

daemon@ATHENA.MIT.EDU (Christopher L. Morrow)
Wed Aug 3 17:24:48 2005

Date: Wed, 03 Aug 2005 21:22:51 +0000 (GMT)
From: "Christopher L. Morrow" <christopher.morrow@mci.com>
In-reply-to: <6.2.1.2.0.20050803170349.076810f8@64.7.153.2>
To: Mike Tancsa <mike@sentex.net>
Cc: nanog@nanog.org
Errors-To: owner-nanog@merit.edu



On Wed, 3 Aug 2005, Mike Tancsa wrote:

> At 04:55 PM 03/08/2005, Christopher L. Morrow wrote:
> > > hops away, the TTL of the packet when it got to me was 56).  Yes, I know
> > > those could be adjusted in theory to mask multiple sources, but in practice
> > > has anyone seen that ?
> >
> >what exactly was the question?
>
> You answered it mostly-- what do people see in the real world-- plain jane

oh phew :)

> dropped before they leave my network). Have that many networks implemented
> RPF as to make spoofed addresses moot ?

probably not :( reference the MIT spoofer project:
paper ->
http://www.mit.edu/~rbeverly/papers/spoofer-sruit05.html
nanog preso ->
http://www.nanog.org/mtg-0505/beverly.html

project-homepage: http://spoofer.csail.mit.edu.

probably simpler to just get bots than spoof.


home help back first fref pref prev next nref lref last post