[29740] in North American Network Operators' Group
RE: RBL-type BGP service for known rogue networks?
daemon@ATHENA.MIT.EDU (Mark Mentovai)
Thu Jul 6 17:02:40 2000
Date: Thu, 6 Jul 2000 16:22:44 -0400 (EDT)
From: Mark Mentovai <marklist@ggn.net>
To: nanog@merit.edu
In-Reply-To: <0127E258EE29D3118A0F00609765B44831787D@subnet-gw-00053.sitestream.net>
Message-ID: <Pine.GSO.4.21.0007061619290.3647-100000@elm.ggn.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
Karyn Ulriksen wrote:
>What I was saying is that they had already set up some type of blackhole
>system that I was lead to believe they were doing at the router level (not
>mail system level). When they had us blackhole, we couldn't get past their
>core routers. I know your next thougt is that they just threw us into their
>route filter, but my understanding is that they offered a service that you
>subscribed to and the updated the filter on the fly. Which sounds like it
>would work for what you may be looking for in the "kiddie script network"
>scenario (which I assume means either IRC crapola or DOS crapola in general)
>or those wonderful .ru sites serving out that hardcore kiddie porn stuff via
>cgi calls.
You can play tricks with BGP to do this. Here's how MAPS RBL does it, and
how you can use it:
http://www.mail-abuse.org/rbl/usage.html#BGP
Mark
--
Do not reply directly to this e-mail address
--
Mark Mentovai
UNIX Engineer
Gillette Global Network