[93894] in North American Network Operators' Group
Re: Phishing and BGP Blackholing
daemon@ATHENA.MIT.EDU (Fergie)
Wed Jan 3 01:47:52 2007
From: "Fergie" <fergdawg@netzero.net>
Date: Wed, 3 Jan 2007 06:44:34 GMT
To: nanog@nanog.org
Errors-To: owner-nanog@merit.edu
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Instead of quoting earlier submissions, let me just add two
thoughts to this Bad Idea (tm):
(1) Proxy bypasses; and
(2) Fast-Flux place-shifters...
These are two hard problems, by themselves, although not impossible.
Having said that, injecting candidate host-routes into BGP (given
the already intolerable churn) is a horribly worse idea.
Good luck with all that...
- - ferg
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.5.2 (Build 4075)
wj8DBQFFm1DNq1pz9mNUZTMRAqyxAJwOrUTIs1Olrj8Gt2jB+Uc9557WqgCfQO+R
LSsa8HsYTOkZPi4sjtQFUyY=3D
=3DHvaD
-----END PGP SIGNATURE-----
--
"Fergie", a.k.a. Paul Ferguson
Engineering Architecture for the Internet
fergdawg(at)netzero.net
ferg's tech blog: http://fergdawg.blogspot.com/