BCP38 (was: Re: Why won't providers source-filter attacks? Simple.)

Dobbins, Roland rdobbins at arbor.net
Fri Feb 7 21:07:17 UTC 2014


On Feb 8, 2014, at 3:37 AM, John Curran <jcurran at arin.net> wrote:

> It's also true that if a sizable group of network operators were to actually deploy source address validation (thus proving that it really is a reasonable approach and doesn't carry too much operational or vendor implications), then it would be quite reasonable for those operators to bring the results to NANOG and get it recognized as a best current operating practice for networks of similar design/purpose.

Many already do - including operators of very large networks.  There are operational, vendor, and topological considerations which mean that it's achieved utilizing various mechanisms in different scenarios.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>

	  Luck is the residue of opportunity and design.

		       -- John Milton




More information about the NANOG mailing list