[107214] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Revealed: The Internet's well known BGP behavior

daemon@ATHENA.MIT.EDU (Patrick W. Gilmore)
Wed Aug 27 23:18:33 2008

From: "Patrick W. Gilmore" <patrick@ianai.net>
To: NANOG list <nanog@merit.edu>
In-Reply-To: <53A6C7E936ED8544B1A2BC990D254F942BF6159AFE@MEMEXG1.HOST.local>
Date: Wed, 27 Aug 2008 23:18:25 -0400
Errors-To: nanog-bounces@nanog.org

On Aug 27, 2008, at 11:07 PM, John Lee wrote:

> 1. The technique is not new it is well known BGP behavior and not  
> stealthy to people who route for a living.

Using existing technology in novel ways is still novel.  Plus it makes  
the technique more accessible.  (Perhaps that is not a good thing?)


> 2. When your networks use VPNs, MPLS, IPsec, SSL et al you can  
> control what packets are going where.

No, you cannot.  You can only ensure your end points are the end  
points you think they are.  In no way, shape, or form do things like  
IPsec, SSL, etc. verify or control the intermediate hops.


> 3. When you are running some number of trace routes per hour to see  
> how and where your packets are going you spot the additional hops.

The presentation specifically shows hiding the hops by re-writing  
TTLs.  Perhaps you do not understand this attack as well as you thought?


> 4. If you do cold potatoe routing and know where you peering points  
> are and what the acls and peering policies are it is more difficult  
> to hijack.

Would that network operators were so diligent.


> And finally you use high speed optical paths or broad band ISDN  
> (ATM) why route when you can deterministically switch.

Because people want to be able to reach the entire planet with a  
single port and without "deterministically" creating paths to every  
single end point.

Why use ISDN (ATM) when you can do something useful?

-- 
TTFN,
patrick



home help back first fref pref prev next nref lref last post