[50576] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: If you have nothing to hide

daemon@ATHENA.MIT.EDU (bdragon@gweep.net)
Mon Aug 5 12:01:39 2002

To: len@netsys.com (Len Rose)
Date: Mon, 5 Aug 2002 12:00:20 -0400 (EDT)
Cc: nanog@merit.edu
In-Reply-To: <20020805110344.T6708@netsys.com> from "Len Rose" at Aug 05, 2002 11:03:44 AM
From: <bdragon@gweep.net>
Errors-To: owner-nanog-outgoing@merit.edu


> 
> Of course, I mean denial of service attacks using source routing, i.e. made
> possible by use of same. I guess I need to be semantically perfect and
> I don't always have a wonderful command of the english language it seems,
> but please grant that I'm not stupid.
> 
> Thanks

I understood what you were saying, I just was not aware of any attacks
which used source routing.

I was, and am, asking for clarification on that.

Is it just a simple "overwhelm the router with whatever ip options I can"
type attack? Or are you aware of people actively using source routing
to get around weak defenses? Something else?


home help back first fref pref prev next nref lref last post