Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: SYN spoofing

  • From: John Fraizer
  • Date: Wed Jul 28 14:06:33 1999


Perhaps if you were to NAME these networks, they may be shamed into doing
something about the problem.  Then again, they should be ashamed to begin
with for passing RFC1918 traffic, let alone loopback space.

At 11:23 AM 7/26/99 -0700, Dan Hollis wrote:
>
>On Mon, 26 Jul 1999 bandregg@redhat.com wrote:
>> Oh yeah, and filter this stuff out people, this is unacceptible.
>
>On the topic of unacceptable stuff.
>
>A number of backbones are STILL transporting rfc1918-sourced packets.
>This is getting really old, really fast.
>
>The last attack we saw included 127.0.0.0/24 sourced packets along
>with rfc1918 sourced and other garbage (255.255.255.255 for example).
>
>The first mistake is accepting this crap from customers. The second
>mistake is tranporting this crap to the other side of the globe.
>
>Get with the program, people.
>
>-Dan
>


------------
John Fraizer  
------------
mailto:john.fraizer@EnterZone.Net
http://www.EnterZone.Net
http://www.EZ-Hosting.Net
http://www.EZ-IP.Net
------------------------------------------
|    __   _                 |            |
|   / /  (_)__  __ ____  __ | The choice |
|  / /__/ / _ \/ // /\ \/ / |  of a GNU  |
| /____/_/_//_/\_,_/ /_/\_\ | Generation |
|                           |            |
------------------------------------------







Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.