[29860] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RBL-type BGP service for known rogue networks?

daemon@ATHENA.MIT.EDU (Peter van Dijk)
Sat Jul 8 13:40:47 2000

Mail-Followup-To: nanog@merit.edu
Date: Sat, 8 Jul 2000 19:38:36 +0200
From: Peter van Dijk <petervd@vuurwerk.nl>
To: nanog@merit.edu
Message-ID: <20000708193836.A17057@vuurwerk.nl>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <200007081727.e68HRhX26071@hi.tech.org>; from stuart@mfnx.net on Sat, Jul 08, 2000 at 10:27:43AM -0700
Errors-To: owner-nanog-outgoing@merit.edu


On Sat, Jul 08, 2000 at 10:27:43AM -0700, Stephen Stuart wrote:
> 
> > I see 2 possibilities:
> > - MAPS doesn't test if a reported spamhouse is really an open relay, and is
> >   therefore susceptible to forgery.
> > - MAPS does do open relay testing and therefore performs the same
> >   'unsolicited traffic' as ORBS, which would mean they're hypocritic.
> 
> testing != probing, so your list of possibilities is incomplete.

Standing slightly corrected by another post, it seems MAPS investigates
each report thoroughly.

I do not see how you would check if a machine is an open relay without
testing, tho.

Greetz, Peter.
-- 
petervd@vuurwerk.nl - Peter van Dijk [student:developer:ircoper]


home help back first fref pref prev next nref lref last post