Blockchain and Networking

Christopher Morrow morrowc.lists at gmail.com
Sat Jan 13 02:26:14 UTC 2018


On Fri, Jan 12, 2018 at 5:20 PM, <valdis.kletnieks at vt.edu> wrote:

> On Thu, 11 Jan 2018 15:28:19 -0500, William Herrin said:
> > On Thu, Jan 11, 2018 at 2:46 PM, Dale W. Carder <dwcarder at es.net> wrote:
> > >
> > > Traceroute or any other path diagnostics comes to mind.
>
> > That's not obvious to me. Assuming the time-exceeded message was modified
> > to include the necessary data, how would blockchain authenticate the
> > responding router?
>
> And do you really want to do *all* that on every single 'TTL Exceeded'
> ICMP?  Sounds like
> a *really* easy way to DDoS a router....
>

pish-posh! the asics will do it.



More information about the NANOG mailing list