[nsp-sec] CUTRS: Community Unwanted Traffic Removal Service
Smith, Donald
Donald.Smith at CenturyLink.com
Tue May 20 15:59:25 EDT 2014
Barrow and improve on it as you will. We might want to do a short RFC to document the different names/methods of BHF/SHF.
"Pampers use multiple layers of protection to prevent leakage. Rommel used defense in depth to defend European fortresses." (A.White) Donald.Smith at CenturyLink.com
>-----Original Message-----
>From: John Kristoff [mailto:jtk at cymru.com]
>Sent: Tuesday, May 20, 2014 10:23 AM
>To: Smith, Donald
>Cc: David Freedman; nsp-security at puck.nether.net
>Subject: Re: [nsp-sec] CUTRS: Community Unwanted Traffic Removal Service
>
>On Mon, 19 May 2014 23:52:00 +0000
>"Smith, Donald" <Donald.Smith at CenturyLink.com> wrote:
>
>> I don't think so. I think it is to DBBHF victim ips to stop some of
>> the really large attacks.
>
>Correct.
>
>We could add some of the other types over time if appropriate. In
>particular, we did want to allow for a peer to customize the next-hop
>for a destination-based sink hole.
>
>> BTW we need standard language for BHFing.
>> This is what I use. CYMRU you didn't say which bhfing this was :)
>
>We will borrow your language if you don't mind, thank you Don.
>
>John
More information about the nsp-security
mailing list