nanog mailing list archives
Re: DoS Attacks
From: Sean Donelan <sean () donelan com>
Date: Wed, 8 Oct 2003 00:17:58 -0400 (EDT)
On Tue, 7 Oct 2003, Avleen Vig wrote:
You knew the sources are small and you knew where they were. You did the right thing by contacting FSU, and then their upstream. If either was unresponsive, they are being extremely neglegent.
Its generally a better idea to contact your own upstream provider first. Your own upstream knows you, and is supposedly paid to help you. Your upstream should have contacts with its BGP peers and eventually the source. A problem with calling random NOCs is they don't know you from someone trying to social engineer something. So you end up delaying effective response while they try to figure out who you are, and how your report is related to them. If you have a problem with your credit card, your own bank is in a better position to help you than calling random other banks in the world even if you did have their phone number. Other banks may care about security, but they still don't know who you are. If your own upstream won't help you, you may have no choice but to beg other NOCs to help you.
Current thread:
- DoS Attacks Brian Bruns (Oct 07)
- Re: DoS Attacks Mark Radabaugh (Oct 07)
- Re: DoS Attacks Brian Bruns (Oct 07)
- Re: DoS Attacks Haesu (Oct 07)
- Re: DoS Attacks Martin Hepworth (Oct 08)
- Re: DoS Attacks Andrew D Kirch (Oct 08)
- Re: DoS Attacks Alan Spicer (Oct 08)
- Re: DoS Attacks Haesu (Oct 08)
- Re: DoS Attacks Laurence F. Sheldon, Jr. (Oct 08)
- Re: DoS Attacks Brian Bruns (Oct 07)
- Re: DoS Attacks Mark Radabaugh (Oct 07)
- Re: DoS Attacks Sean Donelan (Oct 07)