WANTED: ISPs with DDoS defense solutions

Jack Bates jbates at brightok.net
Mon Aug 4 21:59:53 UTC 2003


Randy Bush wrote:
>>anti-spoofing eliminates certain avenues of attack allowing one to focus
>>on remaining avenues, and hence (as Vix stated) is necessary but not
>>sufficient.
> 
> 
> it turns 1% of the technical problem into a massive social business
> problem which, even if it was solvable (which it practically isn't),
> would also be addressed by technical solutions where no spoofing is
> involved.
> 
Spoofed packets are harder to trace to the source than non-spoofed 
packets. Knowing where a malicious packet is very important to the 
process of trying to stop the malicious packet(s). Anyone without 
anti-spoof filtering has no interest in managing their network, keeping 
it secure, and assisting the Internet as a whole.

Without spoofing, one could take a list of 5,000 IP addresses involved 
in an attack and say, "These are either compromised or direct attacks," 
and issue reports to the correct people (with a few scripts). With 
spoofing, there is no reliable way of knowing if a host is compromised, 
the attacker, or if it's just another IP being spoofed. In such cases, 
on has to contact each IP owner and find out if spoof protection is 
enabled. If it is, then the party needs to look into the problem. If 
not, then it's just another waste of time.


-Jack




More information about the NANOG mailing list