On 18 Mar 2015, at 17:00, Roland Dobbins wrote:

This is not an optimal approach, and most providers are unlikely to engage in such behavior due to its potential negative impact (I'm assuming you mean via S/RTBH and/or flowspec).

Here's one counterexample:

<https://ripe68.ripe.net/presentations/176-RIPE68_JSnijders_DDoS_Damage_Control.pdf>

-----------------------------------
Roland Dobbins <[email protected]>

Reply via email to