[107779] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: community real-time BGP hijack notification service

daemon@ATHENA.MIT.EDU (Randy Bush)
Sat Sep 13 03:21:24 2008

Date: Sat, 13 Sep 2008 16:21:02 +0900
From: Randy Bush <randy@psg.com>
To: nanog <nanog@merit.edu>
In-Reply-To: <54127B0D-A21D-436B-B502-CC5A41A80ED0@daork.net>
Errors-To: nanog-bounces@nanog.org

i am occasionally asked if there have been real bgp attacks (not slips).
the answer is, of course yes, but there are none which can be publicly
described.  when bucks and embarrassment are involved, security through
obscurity seems to rule.

but tony and alex did us an enormous favor by publicly conducting such
an attack, see http://www.merit.edu/mail.archives/nanog/msg10357.html

so, what i want to know is which, if any of the tools being discussed on
this thread *actually* did or could detect and/or mitigate the tony/alex
defcon attack.

i appreciate the dozens of tools that detect and mitigate finger or
brain fumbles.  but those are not where the black hats are gonna go to
make the big bucks.

randy


home help back first fref pref prev next nref lref last post