In article <gllmur$2sh...@sf1.isc.org>,
 Mark Andrews <mark_andr...@isc.org> wrote:

> In message <fvhsn493t2pb75c93nm1s14lkttiu0i...@4ax.com>, "Tony Toews [MVP]" 
> wri
> tes:
> > Gregory Hicks <ghi...@hicks-net.net> wrote:
> > 
> > 
> > >> 2) What are they?
> > >
> > >They look like the DDoS being discussed on the NANOG list.
> > >
> > >Have you implemented BCP38?  If not, why not...
> > 
> > I have no idea what BCP38 is and how I can implement that.
> 
>       http://www.ietf.org/rfc/rfc3704.txt

That's BCP84.

But in either case, implementing it doesn't protect you from attacks 
like this, it only prevents you from being the source of attacks on 
others.

-- 
Barry Margolin, bar...@alum.mit.edu
Arlington, MA
*** PLEASE don't copy me on replies, I'll read them in the group ***
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to