Re: Permitting spoofed traffic [Was: Re: ddos attack blog]

2014-02-14 Thread Jeff Kell
On 2/14/2014 9:07 PM, Paul Ferguson wrote: > Indeed -- I'm not in the business of bit-shipping these days, so I > can't endorse or advocate any particular method of blocking spoofed IP > packets in your gear. If you're dead-end, a basic ACL that permits ONLY your prefixes on egress, and blocks you

Re: Permitting spoofed traffic [Was: Re: ddos attack blog]

2014-02-14 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 2/14/2014 4:09 PM, Joe Provo wrote: > On Fri, Feb 14, 2014 at 10:42:55AM -0800, Paul Ferguson wrote: > [snip] >> Taken to the logical extreme, the "right thing" to do is to deny >> any spoofed traffic from abusing these services altogether. NTP

Re: Permitting spoofed traffic [Was: Re: ddos attack blog]

2014-02-14 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 2/14/2014 3:00 PM, Larry Sheldon wrote: > On 2/14/2014 12:42 PM, Paul Ferguson wrote: >> Taken to the logical extreme, the "right thing" to do is to deny >> any spoofed traffic from abusing these services altogether. > > Since the 1990s I have a

Re: Permitting spoofed traffic [Was: Re: ddos attack blog]

2014-02-14 Thread Joe Provo
On Fri, Feb 14, 2014 at 10:42:55AM -0800, Paul Ferguson wrote: [snip] > Taken to the logical extreme, the "right thing" to do is to deny any > spoofed traffic from abusing these services altogether. NTP is not the > only one; there is also SNMP, DNS, etc. ...and then we're back to "implement BCP3

Re: Permitting spoofed traffic [Was: Re: ddos attack blog]

2014-02-14 Thread Larry Sheldon
On 2/14/2014 12:42 PM, Paul Ferguson wrote: Taken to the logical extreme, the "right thing" to do is to deny any spoofed traffic from abusing these services altogether. Since the 1990s I have argued (ineffectively, it turns out) a case that says that sentence can be edited down to good advanta