[87576] in North American Network Operators' Group
RE: Infected list
daemon@ATHENA.MIT.EDU (Scott Morris)
Mon Dec 26 21:13:39 2005
Reply-To: <swm@emanon.com>
From: "Scott Morris" <swm@emanon.com>
To: "'Florian Weimer'" <fw@deneb.enyo.de>
Cc: <Nanog@mandarin.com>, <nanog@merit.edu>
Date: Mon, 26 Dec 2005 21:12:34 -0500
In-Reply-To: <87k6drfxoo.fsf@mid.deneb.enyo.de>
Errors-To: owner-nanog@merit.edu
Irregardless of that, I always thought the whole point of a DDoS attack was
quantity of hosts, not relying on quality of connection.
I thought we were theorizing anyway. ;)
-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of
Florian Weimer
Sent: Monday, December 26, 2005 2:47 PM
To: swm@emanon.com
Cc: Nanog@mandarin.com; nanog@merit.edu
Subject: Re: Infected list
* Scott Morris:
> Not to mention that many IP's may be set to one device, yet there are
> multiple things NAT'd behind it.
Are there any devices which perform non-static NAT and can forward
significant DoS traffic? 8-) Perhaps if it's just a single flow, but this
kind of DoS traffic would be rather unusual.