Ive talked to some major peering exchanges and they refuse to take any action. 
Possibly if the requests come from many peering participants it will be taken 
more seriously?

> On Feb 22, 2014, at 19:23, "Peter Phaal" <peter.ph...@gmail.com> wrote:
> 
> Brocade demonstrated how peering exchanges can selectively filter
> large NTP reflection flows using the sFlow monitoring and hybrid port
> OpenFlow capabilities of their MLXe switches at last week's Network
> Field Day event.
> 
> http://blog.sflow.com/2014/02/nfd7-real-time-sdn-and-nfv-analytics_1986.html
> 
>> On Sat, Feb 22, 2014 at 4:43 PM, Chris Laffin <claf...@peer1.com> wrote:
>> Has anyone talked about policing ntp everywhere. Normal traffic levels are 
>> extremely low but the ddos traffic is very high. It would be really cool if 
>> peering exchanges could police ntp on their connected members.
>> 
>>> On Feb 22, 2014, at 8:05, "Paul Ferguson" <fergdawgs...@mykolab.com> wrote:
>>> 
>>> -----BEGIN PGP SIGNED MESSAGE-----
>>> Hash: SHA256
>>> 
>>>>> On 2/22/2014 7:06 AM, Nick Hilliard wrote:
>>>>> 
>>>>> On 22/02/2014 09:07, Cb B wrote:
>>>>> Summary IETF response:  The problem i described is already solved
>>>>> by bcp38, nothing to see here, carry on with UDP
>>>> 
>>>> udp is here to stay.  Denying this is no more useful than trying to
>>>> push the tide back with a teaspoon.
>>> 
>>> Yes, udp is here to stay, and I quote Randy Bush on this, "I encourage
>>> my competitors to block udp."  :-p
>>> 
>>> - - ferg
>>> 
>>> 
>>> - --
>>> Paul Ferguson
>>> VP Threat Intelligence, IID
>>> PGP Public Key ID: 0x54DC85B2
>>> 
>>> -----BEGIN PGP SIGNATURE-----
>>> Version: GnuPG v2.0.22 (MingW32)
>>> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>>> 
>>> iF4EAREIAAYFAlMIynoACgkQKJasdVTchbJsqQD/ZVz5vYaIAEv/z2kbU6kEM+KS
>>> OQx2XcSkU7r02wNDytoBANVkgZQalF40vhQED+6KyKv7xL1VfxQg1W8T4drh+6/M
>>> =FTxg
>>> -----END PGP SIGNATURE-----
>> 

Reply via email to