nanog mailing list archives
Re: SYN spoofing
From: John Fraizer <John.Fraizer () EnterZone Net>
Date: Wed, 28 Jul 1999 03:42:32 -0400
Perhaps if you were to NAME these networks, they may be shamed into doing something about the problem. Then again, they should be ashamed to begin with for passing RFC1918 traffic, let alone loopback space. At 11:23 AM 7/26/99 -0700, Dan Hollis wrote:
On Mon, 26 Jul 1999 bandregg () redhat com wrote:Oh yeah, and filter this stuff out people, this is unacceptible.On the topic of unacceptable stuff. A number of backbones are STILL transporting rfc1918-sourced packets. This is getting really old, really fast. The last attack we saw included 127.0.0.0/24 sourced packets along with rfc1918 sourced and other garbage (255.255.255.255 for example). The first mistake is accepting this crap from customers. The second mistake is tranporting this crap to the other side of the globe. Get with the program, people. -Dan
------------ John Fraizer ------------ mailto:john.fraizer () EnterZone Net http://www.EnterZone.Net http://www.EZ-Hosting.Net http://www.EZ-IP.Net ------------------------------------------ | __ _ | | | / / (_)__ __ ____ __ | The choice | | / /__/ / _ \/ // /\ \/ / | of a GNU | | /____/_/_//_/\_,_/ /_/\_\ | Generation | | | | ------------------------------------------
Current thread:
- SYN spoofing bandregg (Jul 26)
- Re: SYN spoofing Dan Hollis (Jul 26)
- Re: SYN spoofing John Fraizer (Jul 28)
- Re: SYN spoofing Joe Shaw (Jul 28)
- Re: SYN spoofing Daniel Senie (Jul 28)
- Re: SYN spoofing Greg A. Woods (Jul 28)
- Re: SYN spoofing Vijay Gill (Jul 28)
- Re: SYN spoofing Wayne Bouchard (Jul 28)
- Re: SYN spoofing Daniel Senie (Jul 28)
- Re: SYN spoofing John Fraizer (Jul 28)
- Re: SYN spoofing Dan Hollis (Jul 26)
- Re: SYN spoofing Forrest W. Christian (Jul 28)
- Re: SYN spoofing Deepak Jain (Jul 28)
- Re: SYN spoofing Dan Hollis (Jul 28)
- Re: SYN spoofing batz (Jul 28)