[29745] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (Tony Mumm)
Thu Jul 6 17:59:19 2000

Message-Id: <200007062107.QAA01673@ins13.netins.net>
To: David Charlap <david.charlap@marconi.com>
Cc: nanog@merit.edu
In-reply-to: Your message of "Thu, 06 Jul 2000 16:27:38 EDT."
             <3964EBBA.84D13BD2@marconi.com> 
Date: Thu, 06 Jul 2000 16:07:07 -0500
From: Tony Mumm <tonym@netins.net>
Errors-To: owner-nanog-outgoing@merit.edu



 David Charlap <david.charlap@marconi.com>
    wrote
>
>
>I don't know if this what you were observing, but the MAPS RBL can be
>used in this capacity.  See also:
>
>	http://www.mail-abuse.org/rbl/usage.html#BGP
>
>Of course, you'd want a different database for blocking script kiddies.
>
>-- David

I think that is similar to what you want....and it might be adequate
against scanners and other simple hacks.   I don't think it would be
worth anything against a flood, the flood isn't going to care
that it sees nothing coming back from your network.    It might 
discourage someone if they see no ECHO_REPLYs coming back from their 10 Mbit
smurf....but it probably wouldn't be long before they just stop caring.

Tony


home help back first fref pref prev next nref lref last post