DDOS avoidance is quite high up my list of priority also... I would be
additionally interrested in a mechanism that would identify the attacker
or identify sources of SPAM.

G/

-----Original Message-----
From: Iljitsch van Beijnum [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 14, 2006 3:56 PM
To: Jun Bi
Cc: [EMAIL PROTECTED]; Pekka Savola; [EMAIL PROTECTED]; IETF
IPv6 Mailing List; [EMAIL PROTECTED]
Subject: Re: [SAVA] Re: [Int-area] Call For Participation and
Interest:Source Address Validation Architecture (SAVA)

On 12-sep-2006, at 16:31, Jun Bi wrote:

> DDoS attacks is a cross-layer problems, so the DDoS prevention is out 
> of SAVA's scope.

So what's the use then? Non-DoS related source address spoofing is
easily thwarted by doing a return routability check that contains a
hard-to-guess nonce.

The way it looks here, the focus of SAVA is so narrow that I can't see
how it's worth the effort.

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to