On Sun, Feb 5, 2012 at 10:08 PM, Steve Bertrand <[email protected]> wrote: > This is so very easily automated. Even if you don't actually want to trigger > the routes automatically, finding the sources you want to blackhole is as
What transit providers are doing flow-spec, or otherwise, to allow their downstreams to block malicious traffic by SOURCE address? -- Jeff S Wheeler <[email protected]> Sr Network Operator / Innovative Network Concepts

