[179305] in North American Network Operators' Group
Re: Fixing Google geolocation screwups
daemon@ATHENA.MIT.EDU (Rob Seastrom)
Wed Apr 8 09:48:40 2015
X-Original-To: nanog@nanog.org
To: shawn wilson <ag4ve.us@gmail.com>
From: Rob Seastrom <rs@seastrom.com>
Date: Wed, 08 Apr 2015 09:48:37 -0400
In-Reply-To: <CAH_OBifm5e6HNSA1PQDphwtZLw1SxxrXAFyyXgbnhp-4wBzYvA@mail.gmail.com> (shawn
wilson's message of "Wed, 8 Apr 2015 07:52:01 -0400")
Cc: North American Network Operators Group <nanog@nanog.org>, rs@seastrom.com,
"Aaron C. de Bruyn" <aaron@heyaaron.com>
Errors-To: nanog-bounces@nanog.org
shawn wilson <ag4ve.us@gmail.com> writes:
> On Apr 8, 2015 7:19 AM, "Rob Seastrom" <[[rs@seastrom.com]]> wrote:
>>
>>
>> Blair Trosper <[[blair.trosper@gmail.com]]> writes:
>>
>> > MaxMind (a great product)
>>
>> I've heard anecdotal accounts of MaxMind intentionally marking all
>> address blocks assigned to a VPN vendor as "open proxy" even when
>> advised repeatedly that the disputed addresses (a) had no VPN services
>> running on them either inbound or outbound, and (b) in fact were web
>> servers for the company's payment system, or mail servers for their
>> corporate email.
>>
>
> I would wonder if these apps didn't have issues that allowed web proxy to the
> world. Maybe MaxMind is doing something wrong or maybe they're seeing the
> result of malicious activities and classifying from that.
That was not the conclusion that one would draw from their replies.
-r