Contents
Spoofed DDoS Attacks and BCP 38 https://www.malwarepatrol.net/spoofed-ddos-attacks-and-bcp-38/
All providers of Internet connectivity, operating or not an AS (Autonomous Systems), are highly urged to implement ingress filtering mechanisms according to BCP 38 and RFC 3704 to prohibit attackers from using forged source addresses.
1. history
Unfortunately, this is not implemented in many networks yet. Best practices are known for a long time, the first published RFC on this subject was 2267 in 1998, followed by 2827 (BCP 38) in 2000 and 3704 (BCP 84) in 2004. RFC 2267 – Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing http://tools.ietf.org/html/rfc2267.html RFC 2827 / BCP 38 – Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing http://tools.ietf.org/html/rfc2827.html RFC 3704 / BCP 84 – Ingress Filtering for Multihomed Networkshttp://tools.ietf.org/html/rfc3704.html