Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: SYN floods (was: does history repeat itself?)

  • From: Michael Dillon
  • Date: Mon Sep 09 14:18:02 1996

On Mon, 9 Sep 1996, Perry E. Metzger wrote:

> PANIX, a large public access provider in New York, was badly hit with
> SYN flood attacks from random source addresses over the last few
> days. It nearly wrecked them.
> 
> I think its time for the larger providers to start filtering packets
> coming from customers so that they only accept packets with the
> customer's network number on it. 

I disagree. A better way to do this would be for providers to cooperate to
track down the people who are doing it and make sure to flood the media
with press releases when the culprits are arrested. If the cracker
wannabe's realize that source-spoofed SYN attacks can still be quickly
traced, they will stop doing it.

And the cooperation would do the net some good; maybe lead to more
cooperation down the line.

Michael Dillon                   -               ISP & Internet Consulting
Memra Software Inc.              -                  Fax: +1-604-546-3049
http://www.memra.com             -               E-mail: michael@memra.com

- - - - - - - - - - - - - - - - -




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.