Paul,
Also: I have seen instances where a static route points to a next
hop that (inadvertently) may be redistribute-static injected into
BGP. This happens occasionally due to ad hoc configurations, back-
hole null routing, etc.
And why would an ISP locally try to blackhole traffic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -- Glen Kent [EMAIL PROTECTED] wrote:
If its done intentionally then it would only make sense if theres a
DOS attack coming from that address block, or if theres something
blasphemous put up there. If none of these, then why locally
blackhole
On Sun, Mar 16, 2008 at 2:07 AM, Glen Kent [EMAIL PROTECTED] wrote:
Paul,
Also: I have seen instances where a static route points to a next
hop that (inadvertently) may be redistribute-static injected into
BGP. This happens occasionally due to ad hoc configurations, back-
Thank guyz for your Help.
Above.net finaly resolved the issue
Regards
Felix
Paul Ferguson wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -- Glen Kent [EMAIL PROTECTED] wrote:
If its done intentionally then it would only make sense if theres a
DOS attack coming from that
Did they provide a reason for the outage? If so, please let us know
what the issue was.
Felix Bako wrote:
Thank guyz for your Help.
Above.net finaly resolved the issue
Regards
Felix
Paul Ferguson wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -- Glen Kent [EMAIL PROTECTED]
Christopher Morrow wrote:
I think it was Abovenet that blackholed a /24 of (I want to say MAPS,
but that's not right) an anti-spam-RBL sometime pre-1999?
If I'm not mistaken, that was ORBS.
perhaps they had a significant number of complaints about the address
block and no reaction from the
Kameron Gasso wrote:
Christopher Morrow wrote:
I think it was Abovenet that blackholed a /24 of (I want to say MAPS,
but that's not right) an anti-spam-RBL sometime pre-1999?
If I'm not mistaken, that was ORBS.
Correct. A particularly interesting case, since ORBS' transit provider
was
Helo Felix,
If I were you I'd ask above.net for a _very detailed_ explanation that
includes a statement of their management as well as a plan how to avoid such
a situation in the future.
Fell free to sue them for stealing your prefix and disturbing your
connectivity.
20 hours of outage...
On Mon, 17 Mar 2008, Alastair Johnson wrote:
Correct. A particularly interesting case, since ORBS' transit provider was
also a transit customer of Above.net. Said transit provider would announce
their /16s, of which ORBS sat in a /24 or two of, and have their traffic
blackholed.
IIRC
On Mar 16, 2008, at 2:36 AM, Christopher Morrow wrote:
I think it was Abovenet that blackholed a /24 of (I want to say MAPS,
but that's not right) an anti-spam-RBL sometime pre-1999?
ORBS, and the only reason it became such a big deal was that Abovenet
was the upstream of ORBS' upstream.
On March 16, 2008 at 06:25 [EMAIL PROTECTED] (Paul Ferguson) wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -- Glen Kent [EMAIL PROTECTED] wrote:
If its done intentionally then it would only make sense if theres a
DOS attack coming from that address block, or if theres
[EMAIL PROTECTED] (John Payne) writes:
I think it was Abovenet that blackholed a /24 of (I want to say MAPS,
but that's not right) an anti-spam-RBL sometime pre-1999?
ORBS, and the only reason it became such a big deal was that Abovenet was
the upstream of ORBS' upstream. And that's
12 matches
Mail list logo