[29767] in North American Network Operators' Group
Re: RBL-type BGP service for known rogue networks?
daemon@ATHENA.MIT.EDU (Sean Donelan)
Thu Jul 6 21:44:25 2000
Date: 6 Jul 2000 16:46:51 -0700
Message-ID: <20000706234651.2082.cpmta@c004.sfo.cp.net>
Content-Type: text/plain
Content-Disposition: inline
Mime-Version: 1.0
To: nanog@merit.edu
From: Sean Donelan <sean@donelan.com>
Errors-To: owner-nanog-outgoing@merit.edu
On Thu, 6 Jul 2000, Dan Hollis wrote:
> tin.it obviously fits all 3 criteria and thus would be blackholed. it
> might not get them to change their behaviour, but at least people who
> subscribe to the blackhole list wouldnt be rooted by tin.it customers
While this might seem to be a belt and suspenders approach, anyone who
cares about their machines being rooted spends their time securing
their machines. After securing your machines, RBL'ing tin.it is just
extra work. On the other hand, RBLing tin.it is of limited prophylactic
value since, if you haven't secured your machines, the script kiddies
will just root your machine from elsewhere.