nanog mailing list archives

RE: BGP-based blackholing/hijacking patented in Australia?


From: "Barry Raveendran Greene" <bgreene () cisco com>
Date: Thu, 12 Aug 2004 07:12:35 -0700

 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Just to set the history straight - so it is on the record. RTBH -
Remote Triggered Black Hole filtering reemerged as a key security
reaction tool when two things happened:

1. When Chris Morrow and Brian Gemberling shared their Backscatter
Traceback technique with the world.
http://www.secsup.org/Tracking/

2. When we - Cisco - created uRPF Loose Check to allow for source
based RTBH
(see attached for lots of my links)

My first use of RTBH - what Pipe is saying they invented - was back
in 1991 to stop an attack on a network I was operating. It was a
technique taught to me from someone at JVNCnet. I'm not sure who that
person was - but Steve Johnson - who worked at JVNCnet at that time
and was later my boss confirmed that they were using RTBH every now
and then.

Also note that at least one of the anti-SPAM solutions have used RTBH
for years. MAPS (http://www.mail-abuse.com/) started in 1996.

So it really surprises me that "Pipe has applied for a patent." 

-----Original Message-----
From: owner-nanog () merit edu [mailto:owner-nanog () merit edu] On 
Behalf Of Niels Bakker
Sent: Thursday, August 12, 2004 3:11 AM
To: nanog () merit edu
Subject: BGP-based blackholing/hijacking patented in Australia?



http://australianit.news.com.au/articles/0,7204,10394549%5E153
06%5E%5Enbv%5E,00.html
2004-08-10 (via InfoAnarchy)

"Pipe has applied for a patent for its method of blocking 
access to  deceptive websites linked to fraudulent emails 
that direct users to  fake bank websites to capture bank 
account and password details. [..] "Pipe Networks managing 
director Bevan Slattery said Pipe had been  testing a method 
of enabling banks, ISPs and law enforcement agencies  to 
notify Pipe of new phishing emails. "Pipe could then 
distribute updated internet routing information to ISPs  via 
the border gateway protocol, so internet users could not 
reach the  fraudulent website."

The implications of this are scary.  Hijacking of IP space by 
a private company, supported by the government?


      -- Niels.

-- 
Today's subliminal thought is: 


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQRt6x7/UEA/xivvmEQIMDwCgu728Asqpb5hJAC/PwJVzMJfPsW4AoNtu
y9Bg5VAUS8f3lqheCknRCrRx
=gB4B
-----END PGP SIGNATURE-----
 

Attachment: SP Security Links.txt
Description:


Current thread: