[161997] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Dropping connectivity for Cyberbunker?

daemon@ATHENA.MIT.EDU (Joseph Chin)
Sun Mar 31 19:52:55 2013

X-Report-Abuse-To: abuse@dyndns.com (see
 http://www.dyndns.com/services/sendlabs/outbound_abuse.html for abuse
 reporting information)
From: "Joseph Chin" <l-nanog@iodi.se>
To: <nanog@nanog.org>
Date: Mon, 1 Apr 2013 00:53:15 +0100
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

This article talks about convincing direct peers and transit providers to
stop Net connectivity to the culprit
http://www.darkreading.com/blog/240151931/who-supplies-cyberbunker.html

 

Would it not be easier if a majority of the ISPs simply filter BGP prefixes
containing the aforementioned ASes in the paths? Maybe many of you are
already quietly doing it? This probably won't stop the baddies from spoofing
source addresses for attacks, but it will make Cyberbunker economically
unviable as no one will be able to reach assets hosted on their IP
addresses. They have proven beyond a reasonable doubt that they have no
intention to behave as civilized Netizens. So why should the rest of us
continue to play nice? Does anyone see a problem with this action?

 


home help back first fref pref prev next nref lref last post