[107779] in North American Network Operators' Group
Re: community real-time BGP hijack notification service
daemon@ATHENA.MIT.EDU (Randy Bush)
Sat Sep 13 03:21:24 2008
Date: Sat, 13 Sep 2008 16:21:02 +0900
From: Randy Bush <randy@psg.com>
To: nanog <nanog@merit.edu>
In-Reply-To: <54127B0D-A21D-436B-B502-CC5A41A80ED0@daork.net>
Errors-To: nanog-bounces@nanog.org
i am occasionally asked if there have been real bgp attacks (not slips).
the answer is, of course yes, but there are none which can be publicly
described. when bucks and embarrassment are involved, security through
obscurity seems to rule.
but tony and alex did us an enormous favor by publicly conducting such
an attack, see http://www.merit.edu/mail.archives/nanog/msg10357.html
so, what i want to know is which, if any of the tools being discussed on
this thread *actually* did or could detect and/or mitigate the tony/alex
defcon attack.
i appreciate the dozens of tools that detect and mitigate finger or
brain fumbles. but those are not where the black hats are gonna go to
make the big bucks.
randy