18 Mar
2015
18 Mar
'15
6:04 a.m.
On 18 Mar 2015, at 17:00, Roland Dobbins wrote:
This is not an optimal approach, and most providers are unlikely to engage in such behavior due to its potential negative impact (I'm assuming you mean via S/RTBH and/or flowspec).
Here's one counterexample: <https://ripe68.ripe.net/presentations/176-RIPE68_JSnijders_DDoS_Damage_Control.pdf> ----------------------------------- Roland Dobbins <rdobbins@arbor.net>