[107208] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Revealed: The Internet's Biggest Security Hole

daemon@ATHENA.MIT.EDU (Jason Ross)
Wed Aug 27 22:21:20 2008

Date: Wed, 27 Aug 2008 22:21:12 -0400
From: "Jason Ross" <algorythm@gmail.com>
To: marcus.sachs@verizon.com
In-Reply-To: <6BCAB7B989C2EA4AAD36652C14D4FB450A0A5A@FHDP1CCMXCV02.us.one.verizon.com>
Cc: nanog@merit.edu
Errors-To: nanog-bounces@nanog.org

On Wed, Aug 27, 2008 at 9:52 PM,  <marcus.sachs@verizon.com> wrote:
> Yes, wonderful preso!  My biggest take-away was the fact that the
> vast majority of the attendees did not understand the gravity of the
> demo.

Agreed on both counts: the presentation was great, and largely not
understood it seemed.

>>
>> hehe
>> "new". hehe
>>
>> Maybe something will change now' though, it was a great and
>> impressive presentation, hijacking the defcon network and tweaking
>> TTL to hide it.
>>

Notably, Alex and Tony both mentioned that the BGP tricks were not new
during the presentation, and commented that it would essentially not be
surprising to anyone that groks routing at the level that most of the
folks on this list does.

What was new though according to their presentation (and it was new to
me certainly, but I'm still fairly green) was the AS Path prepending to
complete the circuit, and as you mentioned, the TTL magicks to hide
the hops.

I was suitably impressed at that.

--
Jason


home help back first fref pref prev next nref lref last post