From mboxrd@z Thu Jan 1 00:00:00 1970 From: Florian Weimer Subject: Re: tcp vulnerability? haven't seen anything on it here... Date: Thu, 22 Apr 2004 23:15:21 +0200 Sender: netdev-bounce@oss.sgi.com Message-ID: <87r7ufu32u.fsf@deneb.enyo.de> References: <200404221738.i3MHcg7J005234@eeyore.valparaiso.cl> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Linux Kernel Mailing List , netdev@oss.sgi.com Return-path: To: Horst von Brand In-Reply-To: <200404221738.i3MHcg7J005234@eeyore.valparaiso.cl> (Horst von Brand's message of "Thu, 22 Apr 2004 13:38:42 -0400") Errors-to: netdev-bounce@oss.sgi.com List-Id: netdev.vger.kernel.org Horst von Brand writes: > If everybody (or at least the bigger knots) filters spoofed traffic, > this ceases to be a problem. And that solves a shipload of other > problems, so... There isn't much incentive to deploy filters so that other people don't suffer. So it takes a long time until it's almost universally implemented. (We catch less backscatter from DDoS attacks than a few years ago, so the situation may actually be improving.) -- Current mail filters: many dial-up/DSL/cable modem hosts, and the following domains: atlas.cz, bigpond.com, postino.it, tiscali.co.uk, tiscali.cz, tiscali.it, voila.fr.