[93085] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BCP38 thread 93,871,738,435 (was Re: register.com down sev0?)

daemon@ATHENA.MIT.EDU (Don)
Thu Oct 26 11:55:51 2006

Date: Thu, 26 Oct 2006 11:38:10 -0400 (EDT)
From: Don <don@calis.blacksun.org>
To: nanog@merit.edu
In-Reply-To: <20061026093324.f56f7f5d.smb@cs.columbia.edu>
Errors-To: owner-nanog@merit.edu


> Put another way, anti-spoofing does three things: it makes reflector
> attacks harder, it makes it easier to use ACLs to block sources, and it
> helps people track down the bot and notify the admin. Are people actually
> successfully doing either of the latter two?
I think it's a time constraint- looking up, sorting and notifying admins 
about 10,000 attack sources isn't practical. I'd love to do it- but I 
don't have time. That said- if someone notifies me of a compromised host I 
immediately investigate- and I suspect so would everyone else on this 
list.

Has anyone put together a centralized system where you can send in 
a list of attacking bots, let it automatically sort by allocation, and 
then let it notify the appropriate admin with a list of [potentially] 
compromised hosts?

Then again: Considering how many admins don't care, how many end users 
don't care/know, and how quickly many of thee systems would get 
re-infected maybe it's all a bit pointless.

> I'd be surprised if there were much of either.  That leaves reflector 
> attacks.  Are those that large a portion of the attacks people are 
> seeing?
Everything I have seen of late has been legitimate traffic originating 
from across the globe. With tens of thousands of compromised hosts that's 
all it takes.

-Don

home help back first fref pref prev next nref lref last post