[163671] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: huawei

daemon@ATHENA.MIT.EDU (Michael Thomas)
Thu Jun 13 20:39:59 2013

Date: Thu, 13 Jun 2013 17:39:18 -0700
From: Michael Thomas <mike@mtcc.com>
To: Scott Helms <khelms@zcorum.com>
In-Reply-To: <CAMrdfRzp9f73E10VLTQeBQ7nc9fCyJG72z80tvw6EtZTeRnC0A@mail.gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 06/13/2013 05:28 PM, Scott Helms wrote:
> Bill,
>
> Certainly everything you said is correct and at the same time is not useful
> for the kinds traffic interception that's been implied.  20 packets of
> random traffic capture is extraordinarily unlikely to contain anything of
> interest and eve if you do happen to get a juicy fragment your chances of
> getting more ate virtually nil.  An effective system must either capture
> and transmit large numbers of packets or have a command and control system
> in order to target smaller captures against a shifting list of addresses.
> Either of those things are very detectable.   I've spent a significant
> amount of time looking at botnet traffic which has the same kind of
> requirements.
>

I think you're having a failure of imagination that anything less than
a massive amount of information sent back to the attacker could be
useful. I think there are lots and lots of things that could be extremely
useful that would only require a simple message with "got here" back to the
attacker if the "got here" condition was sufficiently interesting. Spying doesn't
have the same motivations as typical botnets for illicit commerce.

Mike


home help back first fref pref prev next nref lref last post