[governance] Re: How to Prevent Cyber War

Stephane Bortzmeyer bortzmeyer at internatif.org
Wed Feb 3 04:31:39 EST 2010


On Tue, Feb 02, 2010 at 09:07:26PM -0500,
 John Curran <jcurran at arin.net> wrote 
 a message of 51 lines which said:

> The underlying requirement is that an ISP needs to be able to
> identify the party originating any traffic the ISP sends to other
> networks. [...] this enables the large scale hacked server farms
> that then mount attacks

I do not get the point, technically speaking. If the attacker has
access to "a large scale hacked server farm", then he does not need to
disguise the IP addresses of the attacking machines since they are not
officially his machines.

In that case (which is a very common one, a botnet), having BCP 38
filtering at ISPs and having perfect whois access to perfect RIR
databases would not help at all: dDOS performed by botnets typically
do not hide their IP addresses.
____________________________________________________________
You received this message as a subscriber on the list:
     governance at lists.cpsr.org
To be removed from the list, send any message to:
     governance-unsubscribe at lists.cpsr.org

For all list information and functions, see:
     http://lists.cpsr.org/lists/info/governance

Translate this email: http://translate.google.com/translate_t



More information about the Governance mailing list