[175029] in North American Network Operators' Group
Re: Unwanted Traffic Removal Service (UTRS)
daemon@ATHENA.MIT.EDU (Job Snijders)
Wed Oct 8 12:13:38 2014
X-Original-To: nanog@nanog.org
Date: Wed, 8 Oct 2014 18:10:37 +0200
From: Job Snijders <job@instituut.net>
To: John Levine <johnl@iecc.com>
In-Reply-To: <20141008160221.3424.qmail@ary.lan>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Wed, Oct 08, 2014 at 04:02:21PM -0000, John Levine wrote:
> >information. But... (aside from any local safety net filter), it's quite
> >a leap to allow a single entity to inject blackholes for any prefix.
>
> Spamhaus has been distributing their DROP list by BGP for years. The
> world hasn't ended, and I can't recall the last time it had a
> plausible false positive.
The Spamhaus context is different: I know people take that DROP BGP feed
and converting it into ACLs applicable locally on their mailservers, I
don't know of people injecting these prefixes straight into the core.
Kind regards,
Job