Here are some threads:
http://markmail.org/message/4hkuymimt54snpyi
http://markmail.org/message/qc67dfw2zi224ciu
http://markmail.org/message/2pqnaoru5gvxwyn5
Frank
-Original Message-
From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of K MEKKAOUI
Sent: Saturday, February 27, 2016
On Feb 7, 2012, at 1:37 PM, Peter Ehiwe wrote:
What is the best way to mitigate DOS attack against the bgp process of a
router ,
iACLs and CoPP:
https://files.me.com/roland.dobbins/prguob
---
Roland Dobbins
Null routing the source isn't going to stop
snip
Except when doing source based blackholing, see
http://tools.ietf.org/html/draft-kumari-blackhole-urpf-02 section #4
Dave.
Hello,
On Wed, 26 Nov 2008 05:37:59 -0500
Pete Templin [EMAIL PROTECTED] wrote:
One of my customers, a host at 64.8.105.15, is feeling a bonus
~130kpps from 88.191.63.28. I've null-routed the source, though our
Engine2 GE cards don't seem to be doing a proper job of that,
unfortunately.
Mikael Abrahamsson wrote:
Do you really call this little if any information publically visible?
Nope, I was wrong about that. My search-fu on RIPE isn't up to snuff,
apparently; hence the request for assistance.
pt
One of my customers, a host at 64.8.105.15, is feeling a bonus
~130kpps from 88.191.63.28. I've null-routed the source, though our
Engine2 GE cards don't seem to be doing a proper job of that,
unfortunately. The attack is a solid 300% more pps than our aggregate
traffic levels.
Null routing the
Hi,
Please look for proxad.fr -- Free
Free is an ADSL provider based in France and proxad is a hosting
company (please give a look at the dig -x below)
dig -x 88.191.63.28
; DiG 9.5.0b2 -x 88.191.63.28
;; global options: printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NOERROR,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Pete Templin wrote:
One of my customers, a host at 64.8.105.15, is feeling a bonus
~130kpps from 88.191.63.28. I've null-routed the source, though our
Engine2 GE cards don't seem to be doing a proper job of that,
unfortunately. The attack is a
On Wed, 26 Nov 2008, Pete Templin wrote:
It's coming in via 6461, but they don't appear to have any ability to
backtrack it. Their only offer is to blackhole the destination until
the attack subsides. BGP tells me the source is in AS 12322, a RIPE AS
that has little if any information
9 matches
Mail list logo