nanog mailing list archives

RE: BGP-based blackholing/hijacking patented in Australia?


From: "Barry Raveendran Greene" <bgreene () cisco com>
Date: Fri, 13 Aug 2004 07:50:06 -0700


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



The only implementation change to do this would be to provide 
a link from 
the webpage where user might have been redirected to the 
original website 
they wanted to access (it would have to be done by using 
proxy service since ip is not directly available). In such a 
case, this service in case 
of possibly bad ips only functions as an additional warning 
that webpage user wanted to access is considered not to be 
safe and may be used by 
phishers (is that correct term?). Most users would listen to such a
 warning and not give any of personal information if this was to be
a  bank website if they otherwise would have believed the 
phishing email. At the same time, if blackholing this site 
was not correct and user really does want to go to that 
website, person can just click on the link to continue.

Transparent banner insertion might be able to do this. Many of the
caches out there coded this, but operators ended up not using it. 

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQRzUc7/UEA/xivvmEQJHNQCeNcFQDad4rNxA70hA91kmeVrAaSYAnirQ
5gxkVD3vmo6Lts0EyAd1MXOU
=M5dw
-----END PGP SIGNATURE-----


Current thread: