Effective ways to deal with DDoS attacks?
E.B. Dreger
eddy+public+spam at noc.everquick.net
Tue May 7 22:43:17 UTC 2002
> Date: Tue, 07 May 2002 14:50:47 -0700
> From: vern at ee.lbl.gov
>> 2) I'm pretty sure most providers aren't going to let
>> customers determine traffic engineering methods on their
>> networks
> See the above. This is not something done by the customers
> (well they could, but that's not the main idea).
I nominate the trust chain model. Sort of like BGP. If I speak
bad BGP, chances are that higher powers will edit filter-lists
and distribute-lists, and I'll have "set community kick-me" on my
back for the next three years. ;-)
Granted, BGP isn't foolproof. We all can recall some rather, uh,
messy BGP screwups that caused widespread problems. But by and
large, it works rather well.
--
Eddy
Brotsman & Dreger, Inc. - EverQuick Internet Division
Phone: +1 (316) 794-8922 Wichita/(Inter)national
Phone: +1 (785) 865-5885 Lawrence
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <blacklist at brics.com>
To: blacklist at brics.com
Subject: Please ignore this portion of my mail signature.
These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to <blacklist at brics.com>, or you are likely to
be blocked.
More information about the NANOG
mailing list