BGP-based blackholing/hijacking patented in Australia?

Barry Raveendran Greene bgreene at cisco.com
Fri Aug 13 14:55:29 UTC 2004


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


> The service doesn't use a transparent firewall/proxy, but 
> instead updates 
> routing information by BGP and that traffic gets sent to:from 
> the system 
> via a tunnel.

BGP Shunt to a tunnel is has been done by several providers on this
list for years. In some cases, it has been used for Lawful Intercept
(BGP Shunt down a GRE tunnel).

Then there is the BGP Shunt down a MPLS tunnel (the MPLS Shunt). Colt
was one of the first to deploy this:

http://www.ripe.net/ripe/meetings/ripe-46/presentations/ripe46-eof-fis
chbach.pdf


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQRzWEb/UEA/xivvmEQKxzACghLWMX8NxUqGLT/rARvQwWF6LVWQAnR3R
xEuxWqhrC/q9A9HjQ0nsU9nX
=S0M6
-----END PGP SIGNATURE-----




More information about the NANOG mailing list