[140907] in North American Network Operators' Group
Re: Rogers Canada using 7.0.0.0/8 for internal address space
daemon@ATHENA.MIT.EDU (Steven Bellovin)
Tue May 24 22:53:26 2011
From: Steven Bellovin <smb@cs.columbia.edu>
In-Reply-To: <12826530.636.1306286946074.JavaMail.root@benjamin.baylink.com>
Date: Tue, 24 May 2011 22:50:10 -0400
To: Jay Ashworth <jra@baylink.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On May 24, 2011, at 9:29 06PM, Jay Ashworth wrote:
> ----- Original Message -----
>> From: "Jimmy Hess" <mysidia@gmail.com>
>=20
>> On Tue, May 24, 2011 at 4:34 PM, <Vinny_Abello@dell.com> wrote:
>>> I think those within the organization that deploy those vehicles or
>>> are Navy SEALs might sit at different lunch tables than the guys =
worried
>>> about IP address collisions. ;-)
>>=20
>> The F/A-18 Hornets, F/A-22 Raptors are well, and good, but that's old
>> technology The folks in charge of the MQ-1 predator drones might sit =
closer to
>> the guys worried about the IP addresses.
>>=20
>> And automated drone strikes can always be blamed on a malfunction
>> caused by the hijacking
>=20
> If packets that control armed drones cross any router that has access =
even to=20
> SIPRnet, much less the Internet, someone's getting relieved.
=
http://www.eweek.com/c/a/Security/Militants-Hack-Unencrypted-Drone-Feeds-4=
77219/
--Steve Bellovin, https://www.cs.columbia.edu/~smb