DDOS avoidance is quite high up my list of priority also... I would be additionally interrested in a mechanism that would identify the attacker or identify sources of SPAM.
G/ -----Original Message----- From: Iljitsch van Beijnum [mailto:[EMAIL PROTECTED] Sent: Thursday, September 14, 2006 3:56 PM To: Jun Bi Cc: [EMAIL PROTECTED]; Pekka Savola; [EMAIL PROTECTED]; IETF IPv6 Mailing List; [EMAIL PROTECTED] Subject: Re: [SAVA] Re: [Int-area] Call For Participation and Interest:Source Address Validation Architecture (SAVA) On 12-sep-2006, at 16:31, Jun Bi wrote: > DDoS attacks is a cross-layer problems, so the DDoS prevention is out > of SAVA's scope. So what's the use then? Non-DoS related source address spoofing is easily thwarted by doing a return routability check that contains a hard-to-guess nonce. The way it looks here, the focus of SAVA is so narrow that I can't see how it's worth the effort. -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 -------------------------------------------------------------------- -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------