North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: SYN spoofing

  • From: John Fraizer
  • Date: Wed Jul 28 14:06:33 1999

Perhaps if you were to NAME these networks, they may be shamed into doing
something about the problem.  Then again, they should be ashamed to begin
with for passing RFC1918 traffic, let alone loopback space.

At 11:23 AM 7/26/99 -0700, Dan Hollis wrote:
>
>On Mon, 26 Jul 1999 [email protected] wrote:
>> Oh yeah, and filter this stuff out people, this is unacceptible.
>
>On the topic of unacceptable stuff.
>
>A number of backbones are STILL transporting rfc1918-sourced packets.
>This is getting really old, really fast.
>
>The last attack we saw included 127.0.0.0/24 sourced packets along
>with rfc1918 sourced and other garbage (255.255.255.255 for example).
>
>The first mistake is accepting this crap from customers. The second
>mistake is tranporting this crap to the other side of the globe.
>
>Get with the program, people.
>
>-Dan
>


------------
John Fraizer  
------------
mailto:[email protected]
http://www.EnterZone.Net
http://www.EZ-Hosting.Net
http://www.EZ-IP.Net
------------------------------------------
|    __   _                 |            |
|   / /  (_)__  __ ____  __ | The choice |
|  / /__/ / _ \/ // /\ \/ / |  of a GNU  |
| /____/_/_//_/\_,_/ /_/\_\ | Generation |
|                           |            |
------------------------------------------