[29744] in North American Network Operators' Group
RE: RBL-type BGP service for known rogue networks?
daemon@ATHENA.MIT.EDU (Karyn Ulriksen)
Thu Jul 6 17:53:32 2000
Message-ID: <0127E258EE29D3118A0F00609765B448317881@subnet-gw-00053.sitestream.net>
From: Karyn Ulriksen <kulriksen@publichost.com>
To: 'David Charlap' <david.charlap@marconi.com>
Cc: "'nanog@merit.edu'" <nanog@merit.edu>
Date: Thu, 6 Jul 2000 14:03:56 -0700
MIME-Version: 1.0
Content-Type: text/plain;
charset="windows-1252"
Errors-To: owner-nanog-outgoing@merit.edu
>I don't know if this what you were observing, but the MAPS RBL can be
>used in this capacity. See also:
>
> http://www.mail-abuse.org/rbl/usage.html#BGP
>
>Of course, you'd want a different database for blocking script kiddies.
>
>-- David
Ahhh, the sweet smell of validation at last! :) That's it, that what kicked
my network into the ole blackhole back then! - Thanx! Karyn.
Karyn Ulriksen wrote:
>
> What I was saying is that they had already set up some type of
> blackhole system that I was lead to believe they were doing at the
> router level (not mail system level). When they had us blackhole, we
> couldn't get past their core routers. I know your next thougt is that
> they just threw us into their route filter, but my understanding is
> that they offered a service that you subscribed to and the updated the
> filter on the fly.
I don't know if this what you were observing, but the MAPS RBL can be
used in this capacity. See also:
http://www.mail-abuse.org/rbl/usage.html#BGP
Of course, you'd want a different database for blocking script kiddies.
-- David