You will still see backscatter which will let you know your space is being 
spoofed as well. 

This will show in your telemetry. 

Sent from my iCar

> On Jan 27, 2020, at 7:57 PM, Mike Hammett <[email protected]> wrote:
> 
> 
> How would they know what to look for?
> 
> I'm assuming Sony isn't cooperating.
> 
> 
> 
> -----
> Mike Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com
> 
> Midwest-IX
> http://www.midwest-ix.com
> 
> From: "Ben Cannon" <[email protected]>
> To: "Mike Hammett" <[email protected]>
> Cc: "Roland Dobbins" <[email protected]>, "NANOG Operators' Group" 
> <[email protected]>
> Sent: Monday, January 27, 2020 6:40:25 PM
> Subject: Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC
> 
> Transit carriers could work the flows backwards.
> 
> -Ben Cannon
> CEO 6x7 Networks & 6x7 Telecom, LLC 
> [email protected]
> 
> 
> 
> 
> On Jan 27, 2020, at 4:39 PM, Mike Hammett <[email protected]> wrote:
> 
> If someone is being spoofed, they aren't receiving the spoofed packets. How 
> are they supposed to collect anything on the attack?
> 
> Offending host pretending to be Octolus -> Sony -> Real Octolus.
> 
> 
> 
> 
> -----
> Mike Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com
> 
> Midwest-IX
> http://www.midwest-ix.com
> 
> From: "Roland Dobbins" <[email protected]>
> To: "Octolus Development" <[email protected]>
> Cc: "Heather Schiller via NANOG" <[email protected]>
> Sent: Monday, January 27, 2020 6:29:16 PM
> Subject: Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC
> 
> 
> 
> On Jan 28, 2020, at 04:12, Octolus Development <[email protected]> wrote:
> 
> It is impossible to find the true origin of where the spoofed attacks are 
> coming from.
> 
> This is demonstrably untrue. 
> 
> If you provide the requisite information to operators, they can look through 
> their flow telemetry collection/analysis systems in order to determine 
> whether the spoofed traffic traversed their network; if it did so, they will 
> see where it ingressed their network. 
> 
> With enough participants who have this capability, it's possible to trace the 
> spoofed traffic back to its origin network, or at least some network or 
> networks topologically proximate to the origin network. 
> 
> That's what Damian is suggesting. 
> 
> --------------------------------------------
> Roland Dobbins <[email protected]>
> 
> 

Reply via email to