[37071] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: black hat .cn networks

daemon@ATHENA.MIT.EDU (Roeland Meyer)
Mon Apr 30 22:11:07 2001

Message-ID: <9DC8BBAD4FF100408FC7D18D1F0922860E456A@condor.mhsc.com>
From: Roeland Meyer <rmeyer@mhsc.com>
To: 'Jim Mercer' <jim@reptiles.org>, Dan Hollis <goemon@anime.net>
Cc: Roeland Meyer <rmeyer@mhsc.com>,
	"'nanog@merit.edu'" <nanog@merit.edu>
Date: Mon, 30 Apr 2001 16:49:27 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Errors-To: owner-nanog-outgoing@merit.edu


> From: Jim Mercer [mailto:jim@reptiles.org]
> Sent: Monday, April 30, 2001 3:23 PM
> 
> On Mon, Apr 30, 2001 at 03:11:25PM -0700, Dan Hollis wrote:
> > On Mon, 30 Apr 2001, Roeland Meyer wrote:
> > > How quickly can CN be firewalled anyway?
> > 
> > As quickly as you can write route-map filters
> 
> i don't know that it will be that easy.

That's kind of my point ...

> surely, not all of china connects through a single AS.

My understanding is that CN has been looking for ways and means to firewall
itself for years. It's not entirely fond of the wild and woolly Internet.

> as well, i suspect that the same hackers would be able to 
> manage a dial-up into some extra-china ISP.

This is exactly why CN has been unsuccessful in their quest.


home help back first fref pref prev next nref lref last post