black hat .cn networks

http://wired.com/news/politics/0,1283,43437,00.html

Time to drop AS4134.

-Dan

Since it was already brought up, I just wanted to point this part out...
:wink:

   "The point of the planned hack-attacks is to encourage the people of
    the U.S to protest against their government and demand peace between
    nations, the hackers said."

scott

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Irinically, when the Chinese protest in their own country, they're
thrown into prison or run over with tanks.

And any Chinese hacker caught hacking into a Chinese government
server is executed.

The Chinese government may not be publically encouraging the hackers
to attack US sites, but they sure as hell aren't doing anything to
discourage it.

- --
Scott

When in reality, people in the US break down into four categories:

1) Those who don't care, and don't understand. They don't care.
2) Those who don't care, and do understand. They're filtering .cn.
3) Those who care, and don't understand. They want us to retaliate.
4) Those who care, and understand. They're retaliating.

Notice none of these involve protesting the US government not making
nicey-nice with China. Considering the fact that they've recently gotten
Most Favored Nation trade status, is there anybody left in the US who
doesn't think we're being nice enough to China?

Do we have any conclusive evidence indicating that the observed web
page defacing and the like actually originated from China?

Though even if so, it seems a bit infantile to blackhole an entire
continent over this recent nonsense, plus long-standing political
differences (falsely assuming for a moment that we all have border
routers capable of performing such ingress filtering without falling
to the floor, policies allowing it, etc...) Especially since there
have been no really crippling network attacks even launched from China
thus far...

-adam

If we're gonna filter, let's filter *broken* stuff first.

RFC1918, RFC2644, RFC2827 filtering.

Oh wait.. we haven't gone the requisite 4 months without arguing THAT
dead horse.. :wink:

On Tue, May 01, 2001 at 11:27:14AM -0400, Valdis Kletnieks had this to say:

> http://wired.com/news/politics/0,1283,43437,00.html
>
> Time to drop AS4134.

If we're gonna filter, let's filter *broken* stuff first.

RFC1918, RFC2644, RFC2827 filtering.

Oh wait.. we haven't gone the requisite 4 months without arguing THAT
dead horse.. :wink:

yeah, we need to wait until there are no other interesting threads before we
drag back out multiple DNS roots/RFC1918 filtering/<insert fun religious topic

Hi,

anyone having the address to knology:s NOC/NCC or similar
function regarding a routing issue?

tia

-- amar

Telia Net