[29834] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Fri Jul 7 17:49:23 2000

Message-Id: <200007072117.e67LHJS33222@black-ice.cc.vt.edu>
To: Dan Hollis <goemon@sasami.anime.net>
Cc: nanog@merit.edu
In-Reply-To: Your message of "Fri, 07 Jul 2000 13:55:42 PDT."
             <Pine.LNX.4.21.0007071355110.21843-100000@anime.net> 
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-1439918896P";
	 micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Fri, 07 Jul 2000 17:17:18 -0400
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_-1439918896P
Content-Type: text/plain; charset=us-ascii

On Fri, 07 Jul 2000 13:55:42 PDT, Dan Hollis said:
> If its spoofed it wouldnt get into the blackhole list. Pretty simple.

Simple to say.  Hard to secure against a determined attacker.

Go and *re*-read Ken Thompson's Turing Award Lecture "On Trusting Trust".

Then start thinking paranoid. ;)

(What, you haven't read it the FIRST time?  Citation:

@ARTICLE{Trusting.Trust,
        author={Ken Thompson},
        title={Reflections on Trusting Trust},
        journal={Communications of the ACM},
        volume=27,
        number=8,
        month=Aug,
        year=1984,
        pages="761-763"
}


-- 
				Valdis Kletnieks
				Operating Systems Analyst
				Virginia Tech



--==_Exmh_-1439918896P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.2
Comment: Exmh version 2.2 06/16/2000

iQA/AwUBOWZI3XAt5Vm009ewEQKEwgCgs7MTWiVBMlzvGIq4SOVucEpIGssAoLIS
UTHVh6a2fyBJpgmxdmF1PDBJ
=+pM8
-----END PGP SIGNATURE-----

--==_Exmh_-1439918896P--


home help back first fref pref prev next nref lref last post