BGP-based blackholing/hijacking patented in Australia?
Barry Raveendran Greene
bgreene at cisco.com
Fri Aug 13 14:55:29 UTC 2004
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> The service doesn't use a transparent firewall/proxy, but
> instead updates
> routing information by BGP and that traffic gets sent to:from
> the system
> via a tunnel.
BGP Shunt to a tunnel is has been done by several providers on this
list for years. In some cases, it has been used for Lawful Intercept
(BGP Shunt down a GRE tunnel).
Then there is the BGP Shunt down a MPLS tunnel (the MPLS Shunt). Colt
was one of the first to deploy this:
http://www.ripe.net/ripe/meetings/ripe-46/presentations/ripe46-eof-fis
chbach.pdf
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3
iQA/AwUBQRzWEb/UEA/xivvmEQKxzACghLWMX8NxUqGLT/rARvQwWF6LVWQAnR3R
xEuxWqhrC/q9A9HjQ0nsU9nX
=S0M6
-----END PGP SIGNATURE-----
More information about the NANOG
mailing list