[37071] in North American Network Operators' Group
RE: black hat .cn networks
daemon@ATHENA.MIT.EDU (Roeland Meyer)
Mon Apr 30 22:11:07 2001
Message-ID: <9DC8BBAD4FF100408FC7D18D1F0922860E456A@condor.mhsc.com>
From: Roeland Meyer <rmeyer@mhsc.com>
To: 'Jim Mercer' <jim@reptiles.org>, Dan Hollis <goemon@anime.net>
Cc: Roeland Meyer <rmeyer@mhsc.com>,
"'nanog@merit.edu'" <nanog@merit.edu>
Date: Mon, 30 Apr 2001 16:49:27 -0700
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Errors-To: owner-nanog-outgoing@merit.edu
> From: Jim Mercer [mailto:jim@reptiles.org]
> Sent: Monday, April 30, 2001 3:23 PM
>
> On Mon, Apr 30, 2001 at 03:11:25PM -0700, Dan Hollis wrote:
> > On Mon, 30 Apr 2001, Roeland Meyer wrote:
> > > How quickly can CN be firewalled anyway?
> >
> > As quickly as you can write route-map filters
>
> i don't know that it will be that easy.
That's kind of my point ...
> surely, not all of china connects through a single AS.
My understanding is that CN has been looking for ways and means to firewall
itself for years. It's not entirely fond of the wild and woolly Internet.
> as well, i suspect that the same hackers would be able to
> manage a dial-up into some extra-china ISP.
This is exactly why CN has been unsuccessful in their quest.