[73130] in North American Network Operators' Group
Re: BGP-based blackholing/hijacking patented in Australia?
daemon@ATHENA.MIT.EDU (Edward B. Dreger)
Fri Aug 13 09:21:51 2004
Date: Fri, 13 Aug 2004 13:21:20 +0000 (GMT)
From: "Edward B. Dreger" <eddy+public+spam@noc.everquick.net>
To: nanog@merit.edu
In-Reply-To: <6.0.1.1.0.20040813203237.01f46a88@mail.pipenetworks.com>
Errors-To: owner-nanog-outgoing@merit.edu
BS> Date: Fri, 13 Aug 2004 21:33:33 +1000
BS> From: Bevan Slattery
BS> The service doesn't use a transparent firewall/proxy, but
BS> instead updates routing information by BGP and that traffic
BS> gets sent to:from the system via a tunnel.
Search recent NANOG presentations. Keep an eye out for "Martini
Tunnels".
BS> One night about 6 months ago, we hosted a Internet Industry
BS> night and quite a few of our biggest customers attended.
IANAL, but I think this is helpful in establishing the critical
date of the claimed. PIPE appears to have joined Postini in
thinking a MITM attack is something new and exotic.
I've admittedly not read the entire thread, but Squid+GRE+WCCP
comes to mind. That combination has been around more than six
months.
Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_________________________________________________________________
DO NOT send mail to the following addresses:
davidc@brics.com -*- jfconmaapaq@intc.net -*- sam@everquick.net
Sending mail to spambait addresses is a great way to get blocked.