Barry Margolin <bar...@alum.mit.edu> wrote: >> >Have you implemented BCP38? If not, why not... >> >> I have no idea what BCP38 is and how I can implement that. Would you be so >> kind as >> to supply links relevant to Windows 2003 Server? > >BCP38 is not something you implement, it's something that has to be >implemented by the ISPs hosting the attacking systems. They have to >block forged source IPs from their customers.
Ah, I did read up on that and was rather puzzled as to what I could do. >Since there are many ISPs out there that are too lazy, incompetent, or >just don't care, where probably never going to be rid of these kinds of >attacks. And plain attacker friendly systems as well. Thanks -- Tony Toews, Microsoft Access MVP Please respond only in the newsgroups so that others can read the entire thread of messages. Microsoft Access Links, Hints, Tips & Accounting Systems at http://www.granite.ab.ca/accsmstr.htm Tony's Microsoft Access Blog - http://msmvps.com/blogs/access/ _______________________________________________ bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users