questions regarding prefix hijacking
LarrySheldon at cox.net
Thu Aug 8 01:12:14 UTC 2013
On 8/7/2013 2:58 PM, Valdis.Kletnieks at vt.edu wrote:
> On Wed, 07 Aug 2013 03:07:04 -0700, Paul Ferguson said:
>> Having said that, there are quite a few documented cases of it being
>> done intentionally, and for nefarious purposes.
> Do I need ECC on my brain to stop the bitrot, or was there a kerfluffle a
> long ways back when somebody announced 127/8, and a surprising number of
> systems actually bit?
Seems like that might have been the first time I was annoying the Big
Net Operators about why they route unroutable traffic.
And a new annoying question: does it seem odd that the Big Net
Operator's Private Mailing List is answering such gut basic and old news
questions about how do I best destroy the Internet, should I wan t to do
Requiescas in pace o email Two identifying characteristics
of System Administrators:
Ex turpi causa non oritur actio Infallibility, and the ability to
learn from their mistakes.
(Adapted from Stephen Pinker)
More information about the NANOG