6 Feb
2012
6 Feb
'12
2:33 a.m.
On Sun, Feb 5, 2012 at 10:08 PM, Steve Bertrand <steve.bertrand@gmail.com> wrote:
This is so very easily automated. Even if you don't actually want to trigger the routes automatically, finding the sources you want to blackhole is as
What transit providers are doing flow-spec, or otherwise, to allow their downstreams to block malicious traffic by SOURCE address? -- Jeff S Wheeler <jsw@inconcepts.biz> Sr Network Operator / Innovative Network Concepts