If someone is being spoofed, they aren't receiving the spoofed packets. How are they supposed to collect anything on the attack?

Offending host pretending to be Octolus -> Sony -> Real Octolus.




-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com

Midwest-IX
http://www.midwest-ix.com


From: "Roland Dobbins" <Roland.Dobbins@netscout.com>
To: "Octolus Development" <admin@octolus.net>
Cc: "Heather Schiller via NANOG" <nanog@nanog.org>
Sent: Monday, January 27, 2020 6:29:16 PM
Subject: Re: Reaching out to Sony NOC, resolving DDoS Issues - Need POC



On Jan 28, 2020, at 04:12, Octolus Development <admin@octolus.net> wrote:

It is impossible to find the true origin of where the spoofed attacks are coming from.

This is demonstrably untrue. 

If you provide the requisite information to operators, they can look through their flow telemetry collection/analysis systems in order to determine whether the spoofed traffic traversed their network; if it did so, they will see where it ingressed their network. 

With enough participants who have this capability, it's possible to trace the spoofed traffic back to its origin network, or at least some network or networks topologically proximate to the origin network. 

That's what Damian is suggesting. 

--------------------------------------------

Roland Dobbins <roland.dobbins@netscout.com>