[102200] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Blackholing traffic by ASN

daemon@ATHENA.MIT.EDU (JAKO Andras)
Fri Feb 1 10:48:29 2008

Date: Fri, 1 Feb 2008 16:46:00 +0100 (CET)
From: JAKO Andras <jako.andras@eik.bme.hu>
To: Christopher Morrow <morrowc.lists@gmail.com>
cc: nanog@merit.edu
In-Reply-To: <75cb24520801302121k48b7a9edq8bca4bc9b64c9369@mail.gmail.com>
Errors-To: owner-nanog@merit.edu


> wee! and for some extra fun, just append the bad-guy's ASN to your
> route announcements, force bgp loop-detection to kill the traffic on
> their end (presuming they don't default-route as well)

Even more fun if you are not the only one filtering that ASN. :)

Andras

home help back first fref pref prev next nref lref last post