[93160] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BCP38 thread 93,871,738,435 + SPF

daemon@ATHENA.MIT.EDU (Gadi Evron)
Sat Oct 28 01:55:44 2006

Date: Sat, 28 Oct 2006 00:52:37 -0500 (CDT)
From: Gadi Evron <ge@linuxbox.org>
To: Douglas Otis <dotis@mail-abuse.org>
Cc: "Chris L. Morrow" <christopher.morrow@verizonbusiness.com>,
	nanog@merit.edu
In-Reply-To: <3A63A74B-44E7-41AD-B2B5-EA38F4D53FDC@mail-abuse.org>
Errors-To: owner-nanog@merit.edu


On Fri, 27 Oct 2006, Douglas Otis wrote:
> As Steve already pointed out, BCP38 is not a complete solution.  Not  
> only does SPF prevent the source of a Botnet attack from being  
> detected, it also enables significantly greater amplification than  
> might be achieved with a spoofed source DNS reflective attack.  In  
> addition, the Botnet resources are not wasted, as their spam is still  
> being delivered.  This aspect alone dangerously changes the costs  
> related to such attacks.   It seems wholly imprudent not to consider  
> SPF in the same discussion.
> 
> -Doug

Doug, I wonder, HOW do you intend / do track down the source of a botnet
attack? I know how I and others do it. There are three approaches which
fork everywhere on an expression tree.

If you believe SPF prevents you from doing it, can you elaborate how?


home help back first fref pref prev next nref lref last post