North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: SYN spoofing
- From: Deepak Jain
- Date: Wed Jul 28 14:08:17 1999
While it is easy, it is not always practical because you often have
customers who advertise thousands of prefixes.
Or, in the simpler case, if you transit 500,000 pps on a single outbound
link/router, it becomes very expensive to do per packet filtering
At our ingress points, for example, (from peers and customers) we do
filter bogus traffic so we in turn, do not pass undesirable traffic on.
At ingress points where you are only seeing 150,000 pps its not so bad
doing per packet filtering.
Just an opinion,
On Wed, 28 Jul 1999, Joe Shaw wrote:
> Any provider who allows the passing of address space that isn't his own
> (beyond whatever transit they may provide to their peers) is shameful.
> How hard is it really to put a filter on your outbound links that says
> drop all ip traffic heading out these links that isn't from my IP space?
> It's just like martian filters for your inbound links, and we'd see a
> significant decrease in spoofing based attacks if it was more widely
> adopted. Not to mention it'll keep peers from dumping traffic on you.
> Joseph W. Shaw - email@example.com
> Freelance Computer Security Consultant and Perl Programmer
> Free UNIX advocate - "I hack, therefore I am."
> On Wed, 28 Jul 1999, John Fraizer wrote:
> > Perhaps if you were to NAME these networks, they may be shamed into doing
> > something about the problem. Then again, they should be ashamed to begin
> > with for passing RFC1918 traffic, let alone loopback space.