[95935] in North American Network Operators' Group
Re: Abuse procedures... Reality Checks
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Wed Apr 11 11:23:42 2007
To: "J. Oquendo" <sil@infiltrated.net>
Cc: Stephen Satchell <list@satchell.net>, nanog@merit.edu,
michael.dillon@bt.com
In-Reply-To: Your message of "Wed, 11 Apr 2007 07:07:19 EDT."
<461CC167.9070408@infiltrated.net>
From: Valdis.Kletnieks@vt.edu
Date: Wed, 11 Apr 2007 11:21:15 -0400
Errors-To: owner-nanog@merit.edu
--==_Exmh_1176304875_4307P
Content-Type: text/plain; charset=us-ascii
On Wed, 11 Apr 2007 07:07:19 EDT, "J. Oquendo" said:
> these so called rules? Many network operators are required to
> do a lot of things, one of these things should be the
> mitigation of malicious traffic from LEAVING their network.
And I want a pony.
We don't even do a (near) universal job of filtering rfc1918 addresses
and spoofed addresses. We aren't filtering obvious bogon packets, how
do you propose we filter less obvious malicious traffic (is that SYN
packet legit, or part of a DDOS, or just a slashdotting of a suddenly
popular site?).
--==_Exmh_1176304875_4307P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001
iD8DBQFGHPzrcC3lWbTT17ARAvEJAJwMhLN7dqdD95moVhYSp+vXWjchhgCfaf2g
SQ7/8VHzSlADegcqj1t/1nM=
=fDAF
-----END PGP SIGNATURE-----
--==_Exmh_1176304875_4307P--