Greetings,
When I was teaching CIS classes at a local Community College, when we would cover Firewalls I always taught them to NOT be the reason someone else is suffering Distributed Denial Of Service (DDOS) attacks. And the way to do this was to follow the "Best Common Practibe 38" (BCP-38) found in the RFC's, to NEVER send out any packets that don't have a SOURCE ADRRESS that is one within your own network. NEVER spoof a source address that is not your own.

      http://www.bcp38.info/index.php/Main_Page

   --- Jay Nugent  WB8TKL
       o Retired
       o Had a nice career at Washtenaw Community College,
         Nugent Telecommunications, ANS/NSFnet, AOL, GTE Telenet,
         Bell Northern Research, Northern Telecom, and others...




On Sat, 5 Apr 2025, Barry Greene via NANOG wrote:


"What is the exact optimum solution?”

You build SAV into your architect. It is that simple. Start with the end in 
mind - ensure no packet leaves your part of the network if the IP source does 
NOT equal the IPs allocated to that network.

It it does, you have FAILED as a network architect.

People get caught up with the widgets you might use to achieve your archectural 
goals. How you do SAV depends on what you are building. What I would do on a 
4G/5G architecture is different from an edge rack on a cloud/edge network which 
is then different from an office enterprise, which is different from a 
broadband provider which is different from my home network which is different 
from ……

Taygun, people get all tided in knots debating on which is best - the nail, the 
wood screw, the bolt, the clamp, wood glue, duct tape  …. All to connect to 
piece of wood together.  Do not get lost in ’SAV widget debate.’

Focus on the regulatory requirement for networks to have SAV be integral to the 
network architecture. Yes, “regulator requirement” .. just like civil 
engineering architecture requirement to ensure a building is safe. It is the 
only way you are going to break the 80/20 problem. We reached 80% SAV 
deployment back in 2012 (see 
https://www.senki.org/everyone-should-be-deploying-bcp-38-wait-they-are/). 
People didn’t like my post, but it was reality. CAIDA got some funding to move 
the Spoofer project and do another year, but then that money disappeared.

If you want  Türkiye to deploy SAV effectively, then you go to the Telecom 
Regulator and ask for them to make it a licensed requirement. They do not need 
the knowledge of the “technical SAV widgets,” they just say - no spoofed 
packets.


_______________________________________________
NANOG mailing list
https://lists.nanog.org/archives/list/[email protected]/message/AOI6DXPG7DCMEH2RVIPXYV7P2KNFSTD2/

_______________________________________________
NANOG mailing list https://lists.nanog.org/archives/list/[email protected]/message/4TV45I7KOLGLCMUJZXF6QYF6FGCUL7TE/

Reply via email to