[167301] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

=?windows-1252?Q?Re=3A_Someone=92s_Been_Siphoning_Data_Through_a?=

daemon@ATHENA.MIT.EDU (Jared Mauch)
Sat Dec 7 15:04:57 2013

From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <20131206195739.GB2811@sources.org>
Date: Sat, 7 Dec 2013 15:05:09 -0500
To: Stephane Bortzmeyer <bortzmeyer@nic.fr>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Dec 6, 2013, at 2:57 PM, Stephane Bortzmeyer <bortzmeyer@nic.fr> =
wrote:

> On Fri, Dec 06, 2013 at 01:05:54PM -0500,
> Jared Mauch <jared@puck.nether.net> wrote=20
> a message of 36 lines which said:
>=20
>> I've detected 11.6 million of these events since 2008 just looking at =
the
>> route-views data.  Most recently the past two days 701 has done a =
large MITM of
>> traffic.
>=20
> The big novelty in the Renesys paper is the proof (with traceroute)
> that there was a return path, something which did not exist in the
> famous Pakistan Telecom case, or in most (all?) other BGP
> hijackings. This return path allows to attacker to really get access
> to the data with little chance of the victim noticing. That's
> something new.

I've been sending the traceroutes to networks for years to get them to =
clean up their acts.  I guess the lesson is publish often?

Folks can see the prefixes involved here:

http://puck.nether.net/bgp/leakinfo.cgi

The ASN search works best.  I'll work on optimizing the prefix stuff as =
it's not returning "promptly".

- Jared=


home help back first fref pref prev next nref lref last post