[29767] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (Sean Donelan)
Thu Jul 6 21:44:25 2000

Date: 6 Jul 2000 16:46:51 -0700
Message-ID: <20000706234651.2082.cpmta@c004.sfo.cp.net>
Content-Type: text/plain
Content-Disposition: inline
Mime-Version: 1.0
To: nanog@merit.edu
From: Sean Donelan <sean@donelan.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Thu, 6 Jul 2000, Dan Hollis wrote:
> tin.it obviously fits all 3 criteria and thus would be blackholed. it
> might not get them to change their behaviour, but at least people who
> subscribe to the blackhole list wouldnt be rooted by tin.it customers

While this might seem to be a belt and suspenders approach, anyone who
cares about their machines being rooted spends their time securing
their machines.  After securing your machines, RBL'ing tin.it is just
extra work.  On the other hand, RBLing tin.it is of limited prophylactic
value since, if you haven't secured your machines, the script kiddies
will just root your machine from elsewhere.





home help back first fref pref prev next nref lref last post