Hacker News new | past | comments | ask | show | jobs | submit login

While your logic is solid and I do think this would be ideal I struggle to see how this would work.

Dropping bombs on a walmart store is clearly unwelcome, sending traffic to walmart's website? Much less clear. You can guess based on the traffic pattern but the only way to really know is to ask walmart if this is welcome traffic (not just a burst because some new product came out). Especially since many cases are DoS with encrypted TLS traffic that looks much like any other traffic to an outside observer.

However much of the protection is threat of retaliation ("if you drop bombs on us we will flatten your country"). So maybe that is the solution here, the government should treat these attacks as real threats and punish those responsible.




Well, a government could start by mandating that internet peers authenticate their packages, and cutting the access of bad actors.

People can't do that, and it's a very basic defense.


"Mandate private companies protect their customers" sounds very different than "the government should protect everyone" even if the result is similar.


Start by mandating BCP38 (RFC2827).


What stops that? (Both its widespread implementation and making it mandatory)


You mean what that protects against?

It provides the first part of my post, authenticating the packages.

The second part is cutting out misbehaving connections. On this case on the article, it would be trivial, and governments should be on the ISP shoulders making them make call everywhere and cutting some of their clients. But there are many attacks where the ISPs don't have enough information to act if they implement something like BCP38.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: