This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/[email protected]/
Heads up: Long AS-sets announced in the next few days
- Previous message (by thread): Heads up: Long AS-sets announced in the next few days
- Next message (by thread): Heads up: Long AS-sets announced in the next few days
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Kurt Erik Lindqvist
kurtis at kurtis.pp.se
Wed Mar 2 20:00:51 CET 2005
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 2005-03-02, at 19.38, James A. T. Rice wrote: > This seems to suggest that you are just picking ASns at random to > inject into the paths, and that you don't have a set of ASs which you > have the assignees permission to use. Would't this then actually equate to resource hijacking along the lines of prefix hijacking? Who will be the first to hit the RIRs? - - kurtis - -----BEGIN PGP SIGNATURE----- Version: PGP 8.1 iQA/AwUBQiYNZ6arNKXTPFCVEQL/sgCdHCBV87HM9jIgNATJhpW5aON/1TwAniAR i1p06marP5ra05ey9YcxX90f =W+rc -----END PGP SIGNATURE-----
- Previous message (by thread): Heads up: Long AS-sets announced in the next few days
- Next message (by thread): Heads up: Long AS-sets announced in the next few days
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]