[179299] in North American Network Operators' Group
Re: Fixing Google geolocation screwups
daemon@ATHENA.MIT.EDU (shawn wilson)
Wed Apr 8 07:52:04 2015
X-Original-To: nanog@nanog.org
In-Reply-To: <86sicadg2l.fsf@valhalla.seastrom.com>
Date: Wed, 8 Apr 2015 07:52:01 -0400
From: shawn wilson <ag4ve.us@gmail.com>
To: "Robert E. Seastrom" <rs@seastrom.com>
Cc: North American Network Operators Group <nanog@nanog.org>,
"Aaron C. de Bruyn" <aaron@heyaaron.com>
Errors-To: nanog-bounces@nanog.org
On Apr 8, 2015 7:19 AM, "Rob Seastrom" <rs@seastrom.com> wrote:
>
>
> Blair Trosper <blair.trosper@gmail.com> writes:
>
> > MaxMind (a great product)
>
> I've heard anecdotal accounts of MaxMind intentionally marking all
> address blocks assigned to a VPN vendor as "open proxy" even when
> advised repeatedly that the disputed addresses (a) had no VPN services
> running on them either inbound or outbound, and (b) in fact were web
> servers for the company's payment system, or mail servers for their
> corporate email.
>
I would wonder if these apps didn't have issues that allowed web proxy to
the world. Maybe MaxMind is doing something wrong or maybe they're seeing
the result of malicious activities and classifying from that.