[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: 03bis draft review
- To: Pekka Savola <pekkas@netcore.fi>
- Subject: Re: 03bis draft review
- From: George Jones <gmj@pobox.com>
- Date: Mon, 22 Mar 2004 07:37:14 -0800 (PST)
- Cc: opsec@ops.ietf.org
- In-reply-to: <Pine.LNX.4.44.0403221526580.15188-100000@netcore.fi>
- References: <Pine.LNX.4.44.0403221526580.15188-100000@netcore.fi>
- Reply-to: gmj@pobox.com
On Mon, 22 Mar 2004, Pekka Savola wrote:
> On Mon, 22 Mar 2004, George Jones wrote:
> > > > I think it is sufficient even in the ethernet case ..given a flood of
> > > > spoofed addresses, if you can find out which interface packets came
> > > > in on, you can do hop-by-hop tracing if necessary.
> > >
> > > Yep -- except if the flood comes through an IX.
> >
> > Internet eXchange ?
>
> yep.
OK. But now we're getting into, cross-network cooperation, laws +
policies, abuse contacts, etc, etc. I think the tecnical req is
valid, necessary, etc. if not sufficient.
---George