[29744] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (Karyn Ulriksen)
Thu Jul 6 17:53:32 2000

Message-ID: <0127E258EE29D3118A0F00609765B448317881@subnet-gw-00053.sitestream.net>
From: Karyn Ulriksen <kulriksen@publichost.com>
To: 'David Charlap' <david.charlap@marconi.com>
Cc: "'nanog@merit.edu'" <nanog@merit.edu>
Date: Thu, 6 Jul 2000 14:03:56 -0700 
MIME-Version: 1.0
Content-Type: text/plain;
	charset="windows-1252"
Errors-To: owner-nanog-outgoing@merit.edu


>I don't know if this what you were observing, but the MAPS RBL can be
>used in this capacity.  See also:
>
>	http://www.mail-abuse.org/rbl/usage.html#BGP
>
>Of course, you'd want a different database for blocking script kiddies.
>
>-- David

Ahhh, the sweet smell of validation at last! :)  That's it, that what kicked
my network into the ole blackhole back then! - Thanx!  Karyn. 

Karyn Ulriksen wrote:
> 
> What I was saying is that they had already set up some type of
> blackhole system that I was lead to believe they were doing at the
> router level (not mail system level).  When they had us blackhole, we
> couldn't get past their core routers.  I know your next thougt is that
> they just threw us into their route filter, but my understanding is
> that they offered a service that you subscribed to and the updated the
> filter on the fly.

I don't know if this what you were observing, but the MAPS RBL can be
used in this capacity.  See also:

	http://www.mail-abuse.org/rbl/usage.html#BGP

Of course, you'd want a different database for blocking script kiddies.

-- David


home help back first fref pref prev next nref lref last post