nanog mailing list archives
Re: peering requirements (Re: DDOS anecdotes)
From: Randy Bush <randy () psg com>
Date: Tue, 26 Jun 2001 13:19:54 -0700
maybe if we come up with a clear statement of the technical issue at hand, those technical folk who manage to get along with their business folk can make some forward progress. it maybe be a bit premature to throw the baby out with the bath-water.ok, let's try it your way. anyone who wants to seriously discuss upgrading the general minimum peering agreement in use by their network so that it can include requirements about (a) not allowing spoofed source addresses to come from their network and (b) only peering, after date $TBD, with those networks who do likewise, should send me their PGP key. if i know you or if someone i know knows you, i'll add you to a private mailing list (@vix.com, not at my day job @paix.net). if you know that the right person to discuss this isn't a NANOG reader, then please forward my note internally and be prepared to (1) teach somebody pgp and (2) sign their key. (randy, i'm betting that the number of respondants will be a single digit.)
odd that your response to a request for a technical problem statement is a request to form a private clique and a pre-made value judgement on the meaning that nobody excspt clique groupies will want to join. imiho, very few social problems have technical solutions, and vice versa. do i correctly glean that you are want peering agreements to require that peers not allow packets with spoofed source addresses? this would not seem too socially unreasonable as long as we know that it is not technically unreasonable. to test the latter, could we please enumerate o the technical means for a peer to achieve this, e.g. i suspect that 2827 is one piece o how thoroughly we think they could achieve this o how we can test that it has been achieved randy
Current thread:
- Re: peering requirements (Re: DDOS anecdotes), (continued)
- Re: peering requirements (Re: DDOS anecdotes) Eric Oosting (Jun 23)
- Re: peering requirements (Re: DDOS anecdotes) Roland Dobbins (Jun 23)
- Re: peering requirements (Re: DDOS anecdotes) Simon Lyall (Jun 23)
- Re: peering requirements (Re: DDOS anecdotes) Roland Dobbins (Jun 23)
- What is evil: IP spoofing or Distributed attacks? (was Re: DDOS anecdotes) Przemyslaw Karwasiecki (Jun 23)
- Re: peering requirements (Re: DDOS anecdotes) Paul Vixie (Jun 26)
- RE: peering requirements (Re: DDOS anecdotes) Przemyslaw Karwasiecki (Jun 26)
- Re: peering requirements (Re: DDOS anecdotes) Paul A Vixie (Jun 26)
- Re: peering requirements (Re: DDOS anecdotes) Randy Bush (Jun 26)
- Re: peering requirements (Re: DDOS anecdotes) Paul A Vixie (Jun 26)
- Re: peering requirements (Re: DDOS anecdotes) Randy Bush (Jun 26)
- Re: peering requirements (Re: DDOS anecdotes) Paul A Vixie (Jun 26)
- Re: peering requirements (Re: DDOS anecdotes) Randy Bush (Jun 26)
- Re: peering requirements (Re: DDOS anecdotes) Paul A Vixie (Jun 26)
- Re: peering requirements (Re: DDOS anecdotes) Randy Bush (Jun 26)
- Re: peering requirements (Re: DDOS anecdotes) Hank Nussbacher (Jun 27)
- Message not available
- RE: DDOS anecdotes Daniel Senie (Jun 23)
- RE: DDOS anecdotes Greg A. Woods (Jun 23)
- Re: DDOS anecdotes Michael Painter (Jun 23)
- Re: DDOS anecdotes Paul Vixie (Jun 23)
- Re: DDOS anecdotes Roland Dobbins (Jun 23)