[29830] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (John Kristoff)
Fri Jul 7 17:13:15 2000

Message-ID: <396644AD.FE81FFC4@depaul.edu>
Date: Fri, 07 Jul 2000 15:59:25 -0500
From: John Kristoff <jtk@depaul.edu>
Reply-To: jtk@aharp.is-net.depaul.edu
MIME-Version: 1.0
To: nanog@merit.edu
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Errors-To: owner-nanog-outgoing@merit.edu


rdobbins@netmore.net wrote:
> Isn't that why some sort of intrusion/exploit-detection system integrated
> with ACLs would perhaps be a better remedy?

Dealing with false positives and "intentional" black holing would be a
difficult thing to get right.  It sounds like the MAPS approach someone
mentioned earlier would be workable.

John


home help back first fref pref prev next nref lref last post