[{"author": "Joel Halpern", "text": "

I added the bar-sav document to the wg individual documents list.

", "time": "2022-11-11T09:36:04Z"}, {"author": "Kotikalapudi Sriram", "text": "

@Roland: Can you please share some pointers for the measurements showing reductions in successful DDoS attacks?

", "time": "2022-11-11T10:21:31Z"}, {"author": "Roland Dobbins", "text": "

@Kotikalapuni \u2014\u00a0http://www.netscout.com/threatreport

", "time": "2022-11-11T10:35:24Z"}, {"author": "Mingqing Huang", "text": "

@ Sriram, yes indeed, if EFP-uRPF is widely deployed anywhere, it will work well for reflective attacks. the problems is that we can not asume that, we may need consider problem based on partial deployment/ collaboration

", "time": "2022-11-11T10:44:42Z"}, {"author": "Kotikalapudi Sriram", "text": "

@Roland: Thank you. I go by Sriram

", "time": "2022-11-11T10:45:25Z"}, {"author": "Roland Dobbins", "text": "

@Sriram \u2014 right, I just saw that the name-order was backwards, apologies. ;>

", "time": "2022-11-11T10:45:49Z"}, {"author": "Kotikalapudi Sriram", "text": "

@Mingqing Not widely. Just AS1 in slide 7 can deploy it on the customer side on the other side where the attack is originating from.

", "time": "2022-11-11T10:50:59Z"}, {"author": "Roland Dobbins", "text": "

We're hearing audio from the room, but not from the presenter.

", "time": "2022-11-11T10:56:28Z"}, {"author": "Roland Dobbins", "text": "

We remote folks can't hear the presenter, who is presumably remote, as well.

", "time": "2022-11-11T10:56:59Z"}, {"author": "Roland Dobbins", "text": "

Now we can. ;>

", "time": "2022-11-11T10:57:10Z"}, {"author": "Roland Dobbins", "text": "

https://datatracker.ietf.org/doc/html/draft-baker-sava-cisco-ip-source-guard-00

", "time": "2022-11-11T11:10:53Z"}, {"author": "Tony Li", "text": "

Volume is too low.

", "time": "2022-11-11T11:14:00Z"}, {"author": "Roland Dobbins", "text": "

https://www.cisco.com/c/en/us/support/docs/broadband-cable/cable-security/20691-source-verify.html

", "time": "2022-11-11T11:14:03Z"}, {"author": "Tony Li", "text": "

Better, thank you.

", "time": "2022-11-11T11:14:29Z"}, {"author": "Kotikalapudi Sriram", "text": "

@Mingqing Also, if you are comparing with the existing solutions like EFP-uRPF, perhaps BAR-SAV should be included, especially since it is a significant improvement over EFP-uRPF. I realize it is still under discussion in IETF. But it is fairly well documented.

", "time": "2022-11-11T11:28:23Z"}, {"author": "Aijun Wang", "text": "

If you have any question, please send it to the mail

", "time": "2022-11-11T11:28:26Z"}, {"author": "Aijun Wang", "text": "

we are overtime now. 3 more minutes for the entire session

", "time": "2022-11-11T11:29:45Z"}, {"author": "Roland Dobbins", "text": "

Where can we see the source code for the implementation of this SAV mechanism?

", "time": "2022-11-11T11:31:21Z"}, {"author": "Doug Montgomery", "text": "

What device was the DUT in these tests?

", "time": "2022-11-11T11:31:26Z"}, {"author": "Mingqing Huang", "text": "

@ Sriram, sure. BAR-SAV is a good proprosal to address the limitation of algorithm A of current RFC. however , in general, the goal is still focus on the spoofed traffic going outside the CC

", "time": "2022-11-11T11:33:08Z"}, {"author": "Darren Dukes", "text": "

A few observations from a quick read of the drafts:

", "time": "2022-11-11T11:35:29Z"}]