This whole 'Internet Thing' is a one of the wonders of the modern world.
A  public transport system that has handled growth easily and
efficiently for many years.  Some people get leisure from it, some make
money from it, some do research on it, some communicate on it,....  It
is one of the most pervasive things I've seen.

Because of the internet's inherent distributed nature, legislation will
get you no where, and besides,l legislation is the easy way out, and not
very effective at that.  Market forces and the golden rule (if that
combo actually works, I'd be amazed) should drive the direction of this
dynamic animal we call 'The Internet'.

If we lived in Nirvana, the Internet would be a beautiful thing.  But as
we live in reality, we have to take the good with the bad.  But overall,
I think the Good is winning over the Bad.

I say:  Cool.

Ray Burkholder


> -----Original Message-----
> From: todd glassey [mailto:[EMAIL PROTECTED]] 
> Sent: January 19, 2003 12:02
> To: Christopher L. Morrow; Stewart, William C (Bill), RTLSL
> Cc: [EMAIL PROTECTED]
> Subject: Re: FW: Re: Is there a line of defense against 
> Distributed Reflective attacks?
> 
> 
> You nor any of the ISP's may like this but the facts of the 
> matter are pretty clean and easily discerned and they all 
> point to the Governance Model for developing and releasing 
> protocols whole cloth on the Internet, no matter what they 
> enable people to do. Its time to take a close accounting of 
> what this "Internet" thing really is and put some stronger 
> legislation in place.
> 
> Todd Glassey
> 
> ----- Original Message -----
> From: "Christopher L. Morrow" <[EMAIL PROTECTED]>
> To: "Stewart, William C (Bill), RTLSL" <[EMAIL PROTECTED]>
> Cc: <[EMAIL PROTECTED]>
> Sent: Friday, January 17, 2003 6:29 PM
> Subject: Re: FW: Re: Is there a line of defense against 
> Distributed Reflective attacks?
> 
> 
> >
> >
> > On Fri, 17 Jan 2003, Stewart, William C (Bill), RTLSL wrote:
> >
> > >
> > >
> > >
> > > -----Original Message-----
> > > From: Stewart, William C (Bill), RTLSL
> > > Sent: Friday, January 17, 2003 5:35 PM
> > > To: '[EMAIL PROTECTED]'
> > > Subject: Re: Is there a line of defense against Distributed 
> > > Reflective attacks?
> > >
> > >
> > > Many of these attacks can be mitigated by ISPs that do 
> anti-spoofing 
> > > filtering on input - only accepting packets from user
> ports
> >
> > Sure, but this is a proven non-scalable solution. HOWEVER, 
> filtering 
> > as close to the end host is scalable and feasible... do it 
> there, it 
> > makes MUCH more sense to do it there.
> >
> > > that have IP addresses that are registered for that port, and not 
> > > accepting incoming packets from outside their network 
> that claim to 
> > > be from inside (except maybe from registered dual-homed
> hosts.)
> > > This cuts down on many opportunities for forgery,
> > > and means that SYN Flood attacks have a much more limited set of 
> > > addresses they can forge (e.g. an attacker or zombie can only 
> > > impersonate other ips sharing its /24 or /29, so it can't 
> pretend to 
> > > be its victim in a reflection or smurf attack.)
> > >
> > > That doesn't stop all reflection attacks; a zombie on a 
> network that 
> > > doesn't do anti-spoofing can send SYNs to a big server on 
> a network 
> > > that also doesn't anti-spoof, so the server will still SYN-ACK
> >
> > its not the 'server' that needs 'anti-spoof' its the end host, the 
> > machine in your livingroom that is on a cable modem for instance... 
> > the server in this instance is a simple, innocent, machine 
> doing its 
> > business.
> >
> > > to the victim.  This cuts out a lot of potential zombie/server 
> > > pairs. If the server that's being used for reflection is 
> someone the 
> > > victim would often talk to, that's a problem (you'd 
> rather not block 
> > > connections to Yahoo), but if it's someone the victim 
> doesn't care 
> > > about talking to (like router23.example.net) you don't 
> mind blocking 
> > > it. (Also, why is router23.example.net SYNACKing somebody 
> it doesn't 
> > > know?)
> > >
> >
> > This is an interesting point. The routers shouldn't really 
> syn-ack (in 
> > this example) bgp from 'unknown' places... unless you are a 
> neighbor 
> > you get squat, or that would be a nice feature, eh? :) For 
> some folks, 
> > the problems aren't confined to just bgp, telnet or ssh on 
> routers are 
> > also problemmatic, vty acl's are important :)
> >
> > > But there are probably 20 million web servers or Kazaa or 
> IM clients 
> > > out
> there,
> > > and probably half of them are on networks that don't 
> spoof-proof, so 
> > > blocking those is much tougher than blocking the big 
> ones. And next 
> > > stop - reflection attacks using big domain servers...
> > >
> >
> > Hmm, I'm not sure, again, that the spoof proof needs to be on the 
> > kazaa server network, it needs to be on the network where the 
> > originating attacke is, preferrably as close to that host 
> as possible, 
> > like it's default router... Now, the problems with 60million kazaa 
> > clients openning the floodgates on you are a whole nother problem :)
> >
> 
> 
> 

Reply via email to