[87576] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Infected list

daemon@ATHENA.MIT.EDU (Scott Morris)
Mon Dec 26 21:13:39 2005

Reply-To: <swm@emanon.com>
From: "Scott Morris" <swm@emanon.com>
To: "'Florian Weimer'" <fw@deneb.enyo.de>
Cc: <Nanog@mandarin.com>, <nanog@merit.edu>
Date: Mon, 26 Dec 2005 21:12:34 -0500
In-Reply-To: <87k6drfxoo.fsf@mid.deneb.enyo.de>
Errors-To: owner-nanog@merit.edu


Irregardless of that, I always thought the whole point of a DDoS attack was
quantity of hosts, not relying on quality of connection.

I thought we were theorizing anyway.  ;) 

-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of
Florian Weimer
Sent: Monday, December 26, 2005 2:47 PM
To: swm@emanon.com
Cc: Nanog@mandarin.com; nanog@merit.edu
Subject: Re: Infected list


* Scott Morris:

> Not to mention that many IP's may be set to one device, yet there are 
> multiple things NAT'd behind it.

Are there any devices which perform non-static NAT and can forward
significant DoS traffic? 8-) Perhaps if it's just a single flow, but this
kind of DoS traffic would be rather unusual.


home help back first fref pref prev next nref lref last post