SYN spoofing
John Fraizer
John.Fraizer at EnterZone.Net
Wed Jul 28 07:42:32 UTC 1999
Perhaps if you were to NAME these networks, they may be shamed into doing
something about the problem. Then again, they should be ashamed to begin
with for passing RFC1918 traffic, let alone loopback space.
At 11:23 AM 7/26/99 -0700, Dan Hollis wrote:
>
>On Mon, 26 Jul 1999 bandregg at redhat.com wrote:
>> Oh yeah, and filter this stuff out people, this is unacceptible.
>
>On the topic of unacceptable stuff.
>
>A number of backbones are STILL transporting rfc1918-sourced packets.
>This is getting really old, really fast.
>
>The last attack we saw included 127.0.0.0/24 sourced packets along
>with rfc1918 sourced and other garbage (255.255.255.255 for example).
>
>The first mistake is accepting this crap from customers. The second
>mistake is tranporting this crap to the other side of the globe.
>
>Get with the program, people.
>
>-Dan
>
------------
John Fraizer
------------
mailto:john.fraizer at EnterZone.Net
http://www.EnterZone.Net
http://www.EZ-Hosting.Net
http://www.EZ-IP.Net
------------------------------------------
| __ _ | |
| / / (_)__ __ ____ __ | The choice |
| / /__/ / _ \/ // /\ \/ / | of a GNU |
| /____/_/_//_/\_,_/ /_/\_\ | Generation |
| | |
------------------------------------------
More information about the NANOG
mailing list