nanog mailing list archives

Re: SYN spoofing


From: John Fraizer <John.Fraizer () EnterZone Net>
Date: Wed, 28 Jul 1999 03:42:32 -0400



Perhaps if you were to NAME these networks, they may be shamed into doing
something about the problem.  Then again, they should be ashamed to begin
with for passing RFC1918 traffic, let alone loopback space.

At 11:23 AM 7/26/99 -0700, Dan Hollis wrote:

On Mon, 26 Jul 1999 bandregg () redhat com wrote:
Oh yeah, and filter this stuff out people, this is unacceptible.

On the topic of unacceptable stuff.

A number of backbones are STILL transporting rfc1918-sourced packets.
This is getting really old, really fast.

The last attack we saw included 127.0.0.0/24 sourced packets along
with rfc1918 sourced and other garbage (255.255.255.255 for example).

The first mistake is accepting this crap from customers. The second
mistake is tranporting this crap to the other side of the globe.

Get with the program, people.

-Dan



------------
John Fraizer  
------------
mailto:john.fraizer () EnterZone Net
http://www.EnterZone.Net
http://www.EZ-Hosting.Net
http://www.EZ-IP.Net
------------------------------------------
|    __   _                 |            |
|   / /  (_)__  __ ____  __ | The choice |
|  / /__/ / _ \/ // /\ \/ / |  of a GNU  |
| /____/_/_//_/\_,_/ /_/\_\ | Generation |
|                           |            |
------------------------------------------





Current thread: