questions regarding prefix hijacking

Larry Sheldon LarrySheldon at cox.net
Thu Aug 8 01:12:14 UTC 2013


On 8/7/2013 2:58 PM, Valdis.Kletnieks at vt.edu wrote:
> On Wed, 07 Aug 2013 03:07:04 -0700, Paul Ferguson said:
>
>> Having said that, there are quite a few documented cases of it being
>> done intentionally, and for nefarious purposes.
>
> Do I need ECC on my brain to stop the bitrot, or was there a kerfluffle a
> long ways back when somebody announced 127/8, and a surprising number of
> systems actually bit?

Seems like that might have been the first time I was annoying the Big 
Net Operators about why they route unroutable traffic.

And a new annoying question:  does it seem odd that the Big Net 
Operator's Private Mailing List is answering such gut basic and old news 
questions about how do I best destroy the Internet, should I wan t to do 
that?


-- 
Requiescas in pace o email           Two identifying characteristics
                                         of System Administrators:
Ex turpi causa non oritur actio      Infallibility, and the ability to
                                         learn from their mistakes.
                                           (Adapted from Stephen Pinker)




More information about the NANOG mailing list