[73134] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: BGP-based blackholing/hijacking patented in Australia?

daemon@ATHENA.MIT.EDU (Barry Raveendran Greene)
Fri Aug 13 10:55:46 2004

From: "Barry Raveendran Greene" <bgreene@cisco.com>
To: "'Bevan Slattery'" <bevan@pipenetworks.com>,
	"'william(at)elan.net'" <william@elan.net>,
	"'Stephen J. Wilcox'" <steve@telecomplete.co.uk>
Cc: "'Michel Py'" <michel@arneill-py.sacramento.ca.us>,
	"'Andre Oppermann'" <nanog-list@nrg4u.com>, <nanog@merit.edu>
Date: Fri, 13 Aug 2004 07:55:29 -0700
In-Reply-To: <6.0.1.1.0.20040813203237.01f46a88@mail.pipenetworks.com>
Errors-To: owner-nanog-outgoing@merit.edu


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


> The service doesn't use a transparent firewall/proxy, but 
> instead updates 
> routing information by BGP and that traffic gets sent to:from 
> the system 
> via a tunnel.

BGP Shunt to a tunnel is has been done by several providers on this
list for years. In some cases, it has been used for Lawful Intercept
(BGP Shunt down a GRE tunnel).

Then there is the BGP Shunt down a MPLS tunnel (the MPLS Shunt). Colt
was one of the first to deploy this:

http://www.ripe.net/ripe/meetings/ripe-46/presentations/ripe46-eof-fis
chbach.pdf


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQRzWEb/UEA/xivvmEQKxzACghLWMX8NxUqGLT/rARvQwWF6LVWQAnR3R
xEuxWqhrC/q9A9HjQ0nsU9nX
=S0M6
-----END PGP SIGNATURE-----


home help back first fref pref prev next nref lref last post