[29834] in North American Network Operators' Group
Re: RBL-type BGP service for known rogue networks?
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Fri Jul 7 17:49:23 2000
Message-Id: <200007072117.e67LHJS33222@black-ice.cc.vt.edu>
To: Dan Hollis <goemon@sasami.anime.net>
Cc: nanog@merit.edu
In-Reply-To: Your message of "Fri, 07 Jul 2000 13:55:42 PDT."
<Pine.LNX.4.21.0007071355110.21843-100000@anime.net>
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-1439918896P";
micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Fri, 07 Jul 2000 17:17:18 -0400
Errors-To: owner-nanog-outgoing@merit.edu
--==_Exmh_-1439918896P
Content-Type: text/plain; charset=us-ascii
On Fri, 07 Jul 2000 13:55:42 PDT, Dan Hollis said:
> If its spoofed it wouldnt get into the blackhole list. Pretty simple.
Simple to say. Hard to secure against a determined attacker.
Go and *re*-read Ken Thompson's Turing Award Lecture "On Trusting Trust".
Then start thinking paranoid. ;)
(What, you haven't read it the FIRST time? Citation:
@ARTICLE{Trusting.Trust,
author={Ken Thompson},
title={Reflections on Trusting Trust},
journal={Communications of the ACM},
volume=27,
number=8,
month=Aug,
year=1984,
pages="761-763"
}
--
Valdis Kletnieks
Operating Systems Analyst
Virginia Tech
--==_Exmh_-1439918896P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.2
Comment: Exmh version 2.2 06/16/2000
iQA/AwUBOWZI3XAt5Vm009ewEQKEwgCgs7MTWiVBMlzvGIq4SOVucEpIGssAoLIS
UTHVh6a2fyBJpgmxdmF1PDBJ
=+pM8
-----END PGP SIGNATURE-----
--==_Exmh_-1439918896P--