[dns-operations] Defending against DNS reflection amplification attacks

Daniel Griggs daniel at pch.net
Sun Feb 24 04:36:10 UTC 2013


On 23/02/2013, at 2:53 AM, Jo Rhett <jrhett at netconsonance.com> wrote:

>> - big companies with staff who care about BCP38 have likely already deployed it;
> 
> No. I've had this conversation many times and employees of big companies feel that it's impossible, and don't even raise the issue with their management. In two different occasions I arranged a meeting with their management and made the case for it, at which point the managers told the unbelieving employee to make it happen.
> 
> BCP has some really good arguments for any public company, basically this.

If you have a presentation that you can share with the class, that would be great.
It would make a useful addition to any security workshops or discussions I have with providers around security.

--
Daniel

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.dns-oarc.net/pipermail/dns-operations/attachments/20130224/29ac44bd/attachment.html>


More information about the dns-operations mailing list