[73134] in North American Network Operators' Group
RE: BGP-based blackholing/hijacking patented in Australia?
daemon@ATHENA.MIT.EDU (Barry Raveendran Greene)
Fri Aug 13 10:55:46 2004
From: "Barry Raveendran Greene" <bgreene@cisco.com>
To: "'Bevan Slattery'" <bevan@pipenetworks.com>,
"'william(at)elan.net'" <william@elan.net>,
"'Stephen J. Wilcox'" <steve@telecomplete.co.uk>
Cc: "'Michel Py'" <michel@arneill-py.sacramento.ca.us>,
"'Andre Oppermann'" <nanog-list@nrg4u.com>, <nanog@merit.edu>
Date: Fri, 13 Aug 2004 07:55:29 -0700
In-Reply-To: <6.0.1.1.0.20040813203237.01f46a88@mail.pipenetworks.com>
Errors-To: owner-nanog-outgoing@merit.edu
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> The service doesn't use a transparent firewall/proxy, but
> instead updates
> routing information by BGP and that traffic gets sent to:from
> the system
> via a tunnel.
BGP Shunt to a tunnel is has been done by several providers on this
list for years. In some cases, it has been used for Lawful Intercept
(BGP Shunt down a GRE tunnel).
Then there is the BGP Shunt down a MPLS tunnel (the MPLS Shunt). Colt
was one of the first to deploy this:
http://www.ripe.net/ripe/meetings/ripe-46/presentations/ripe46-eof-fis
chbach.pdf
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3
iQA/AwUBQRzWEb/UEA/xivvmEQKxzACghLWMX8NxUqGLT/rARvQwWF6LVWQAnR3R
xEuxWqhrC/q9A9HjQ0nsU9nX
=S0M6
-----END PGP SIGNATURE-----