Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: DDoS attacks, spoofed source addresses and adjusted TTLs

  • From: Christopher L. Morrow
  • Date: Wed Aug 03 17:25:42 2005


On Wed, 3 Aug 2005, Mike Tancsa wrote:

> At 04:55 PM 03/08/2005, Christopher L. Morrow wrote:
> > > hops away, the TTL of the packet when it got to me was 56).  Yes, I know
> > > those could be adjusted in theory to mask multiple sources, but in practice
> > > has anyone seen that ?
> >
> >what exactly was the question?
>
> You answered it mostly-- what do people see in the real world-- plain jane

oh phew :)

> dropped before they leave my network). Have that many networks implemented
> RPF as to make spoofed addresses moot ?

probably not :( reference the MIT spoofer project:
paper ->
http://www.mit.edu/~rbeverly/papers/spoofer-sruit05.html
nanog preso ->
http://www.nanog.org/mtg-0505/beverly.html

project-homepage: http://spoofer.csail.mit.edu.

probably simpler to just get bots than spoof.





Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.