[29740] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (Mark Mentovai)
Thu Jul 6 17:02:40 2000

Date: Thu, 6 Jul 2000 16:22:44 -0400 (EDT)
From: Mark Mentovai <marklist@ggn.net>
To: nanog@merit.edu
In-Reply-To: <0127E258EE29D3118A0F00609765B44831787D@subnet-gw-00053.sitestream.net>
Message-ID: <Pine.GSO.4.21.0007061619290.3647-100000@elm.ggn.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


Karyn Ulriksen wrote:
>What I was saying is that they had already set up some type of blackhole
>system that I was lead to believe they were doing at the router level (not
>mail system level).  When they had us blackhole, we couldn't get past their
>core routers.  I know your next thougt is that they just threw us into their
>route filter, but my understanding is that they offered a service that you
>subscribed to and the updated the filter on the fly.  Which sounds like it
>would work for what you may be looking for in the "kiddie script network"
>scenario (which I assume means either IRC crapola or DOS crapola in general)
>or those wonderful .ru sites serving out that hardcore kiddie porn stuff via
>cgi calls.

You can play tricks with BGP to do this.  Here's how MAPS RBL does it, and
how you can use it:

http://www.mail-abuse.org/rbl/usage.html#BGP

Mark

-- 
Do not reply directly to this e-mail address
--
Mark Mentovai
UNIX Engineer
Gillette Global Network



home help back first fref pref prev next nref lref last post