[29803] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (Kai Schlichting)
Fri Jul 7 11:32:59 2000

Message-Id: <4.3.2.7.2.20000707110910.03870460@mail.speedus.net>
Date: Fri, 07 Jul 2000 11:22:52 -0400
To: <nanog@merit.edu>
From: Kai Schlichting <kai@pac-rim.net>
In-Reply-To: <Pine.GSO.4.21.0007070327560.6480-100000@vellocet.insync.ne
 t>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Errors-To: owner-nanog-outgoing@merit.edu


At Friday 04:28 AM 7/7/00, Joe Shaw wrote:

>UUNet's abuse department used to be the same way, especially during the
>weekend.  If you wanted to annoy the piss out of a UUNet dedicated line
>customer, the weekend was the time to do it.  I don't know if that's
>changed now.

Winds are shifting. One of the original spam floods that trigggered the
creation of SpamShield, was from an Alternet dialup, and it took them
a mere 10 minutes to shut that account off. That must have been a different
department at the time:

Try being on the receiving end of a spoofed/randomized SYN/anything
flood that doesn't exceed, say: 1Mbps and doesn't load UUnet's network
so much. They won't even lift a damn finger and TRY to trace this back,
supposedly because they can't trace it back through their ATM PVCs
(an argument that has been backed up by other people I spoke to).
They will happily charge you for the traffic though.
A network design that doesn't allow tracing back spoofed traffic?
Way to go, UUnet.

And yes, I remember CenterTrack: http://www.nanog.org/mtg-9910/robert.html ,
it just wasn't in production at the time - and I have no idea if it was
ever deployed successfully.

Now, lets watch Vijay rush to the defense of his, uhm, stock options.




home help back first fref pref prev next nref lref last post