North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: GTSM - Do you use it?

  • From: John Smith
  • Date: Thu Aug 17 19:49:34 2006
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.co.uk; h=Message-ID:Received:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=iXCrcRxNLma87tgLCGZiwAfnYnmKBK4FszExGXs/ID5r8XNmyhJ3BphQVfHm0FW7xH7bd8wOP7gss8dItV1KlmBuyIXhHPpuGA9JUF2t+N3NSbjYaWUlw4RBW0aMxnnTtD+PInC+4K+xiFShaszCiMdPhc84GgQ9ixA7cY+dMx0= ;

Then is it fair to assume that operators are not using it?

----- Original Message ----
From: Pekka Savola <[email protected]>
To: John Smith <[email protected]>
Cc: [email protected]
Sent: Friday, 18 August, 2006 2:15:31 AM
Subject: Re: GTSM - Do you use it?


On Thu, 17 Aug 2006, John Smith wrote:
> I would like to know if operators use GTSM techniques with BGP and 
> other routing protocols today? Is any at the perimeter of the 
> routing domain deployed? I would believe that GTSM can provide 
> protection against attacks more than a hop away and thus can save 
> against a lot of potential Dos attacks.
>
> Is anything done by the operators here?

We'd love to use it but unfortunately the J vendor doesn't support it 
very well even on T-series (if it supports it at all, not quite 
sure..).

Enhancement Requests haven't gotten through, but maybe gripes on nanog 
will :-(

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings