[34611] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Using unallocated address space - for DoS?

daemon@ATHENA.MIT.EDU (Miguel A.L. Paraz)
Wed Feb 14 09:36:26 2001

Date: Wed, 14 Feb 2001 22:32:48 +0800
From: "Miguel A.L. Paraz" <map@internet.org.ph>
To: "Steven M. Bellovin" <smb@research.att.com>
Cc: nanog@merit.edu
Message-ID: <20010214223248.A20151@mail.q-linux.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20010214142140.616D535C42@berkshire.research.att.com>; from smb@research.att.com on Wed, Feb 14, 2001 at 09:21:32AM -0500
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, Feb 14, 2001 at 09:21:32AM -0500, Steven M. Bellovin wrote:
> You don't have to break into the "right" router; you just have to start 
> announcing the networks in a way that your peers don't -- can't -- 
> detect is improper.


I did not mean that the network operator was malicious.  I meant, in the same
way that vulnerable servers are broken into and used for DoS, can routers
be broken into and do DoS via blackholes?  I think it is hard unless you 
know the right combination of vulnerable router (sniffable LAN?) and
unprotected upstream or peer.


-- 

http://www.internet.org.ph		The Philippine Internet Resource
Mobile Voice/Messaging: 		+63-917-810-9728







home help back first fref pref prev next nref lref last post