On Mar 20, 2013, at 9:44 AM, Stephen Kent <[email protected]>
> You cite DDoS mitigation as an example, whereas it seems to be more the
> example.
Bah.. How many examples do you need?
> Also, it's not clear
> that asserting a new origin AS for a target of such an attack is the only way
> to deal with the problem,
> just the way that it is performed today, for ASes that do not make
> arrangements in advance to counter
> such attacks.
Hah, right. If you've any magic the industry would be interested in it Dr.
Kent. Until then, please try not to break current capabilities that real
operators broadly use..
-danny
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr