Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Scaled Back Cybersecurity

  • From: Daniel Senie
  • Date: Wed Jan 15 12:52:24 2003

At 12:31 PM 1/15/2003, Avi Freedman wrote:


> > - Starting at the core, which is who the Feds buy the most IP from,
> >   still makes life a lot simpler if and when we get the "big one"
> >   in terms of cyber-attack.
>
> Is not the problem with this that few if any attacks originate in the
> core, and by the time the traffics start getting aggregated there it is
> already more or less to late?
>
> - kurtis -

I'm getting at attacks *on* the core as something we need to be
concerned about...
If protecting the core includes protecting the core from further at the edges, then the folks running core components need to require those who connect to them to implement such protection (ingress filtering and whatever other measures are deemed helpful).

There's some precedent for this type of edict. Some years ago UUNet mandated anyone using their dialups MUST implement port 25 filter configs in their Radius servers.

Sure seems like a better thing for the core operators to do than throw their hands in the air and say "it's someone else's problem."




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.