[13833] in bugtraq
Re: DDOS Attack Mitigation
daemon@ATHENA.MIT.EDU (Alan Brown)
Tue Feb 15 13:55:13 2000
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.LNX.4.05.10002150711250.6393-100000@mailhost.manawatu.net.nz>
Date: Tue, 15 Feb 2000 07:13:20 +1300
Reply-To: Alan Brown <alan@MANAWATU.GEN.NZ>
From: Alan Brown <alan@MANAWATU.GEN.NZ>
X-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <200002130850.TAA08542@cairo.anu.edu.au>
On Sun, 13 Feb 2000, Darren Reed wrote:
> You know if anyone was of a mind to find someone at fault over this,
> I'd start pointing the finger at ISP's who haven't been doing this
> due to "performance reasons".
To be fair, if you do this on most terminal servers (eg, Cisco 5300, Max
4000), they will collapse under the load.
> They've had the ability to do it for
> years and in doing so would seriously reduce the number and possibility
> of "spoofing" attacks.
See above. Having enough CPU available to handle spoof filtering from
dialups adds a lot to costs and most ISPs simply can't afford to pay
more in order to be able to provide that benefit. :-(
AB