[29751] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (jlewis@lewis.org)
Thu Jul 6 19:02:55 2000

Date: Thu, 6 Jul 2000 17:35:04 -0400 (EDT)
From: jlewis@lewis.org
To: Dan Hollis <goemon@sasami.anime.net>
Cc: nanog@merit.edu
In-Reply-To: <Pine.LNX.4.21.0007061344170.398-100000@anime.net>
Message-ID: <Pine.LNX.4.10.10007061733220.2042-100000@redhat1.mmaero.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, 6 Jul 2000, Dan Hollis wrote:

> 1) Someone sets up server X on company Y network and starts rooting sites.
> 2) company Y, once notified, refuses to shut down server X, even when its
>    been CONFIRMED server X is indeed rooting sites.
> 3) company Y has a HISTORY of such attacks and refuses to take any action.
> 
> tin.it obviously fits all 3 criteria and thus would be blackholed. it
> might not get them to change their behaviour, but at least people who
> subscribe to the blackhole list wouldnt be rooted by tin.it customers

Except that any good script kid has root on numerous boxes.  Just blocking
a well known site full of rooted boxes probably won't do much good since
they crack and scan from random boxes all over the world as they root
them.

----------------------------------------------------------------------
 Jon Lewis *jlewis@lewis.org*|  I route
 System Administrator        |  therefore you are
 Atlantic Net                |  
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________



home help back first fref pref prev next nref lref last post