[50576] in North American Network Operators' Group
Re: If you have nothing to hide
daemon@ATHENA.MIT.EDU (bdragon@gweep.net)
Mon Aug 5 12:01:39 2002
To: len@netsys.com (Len Rose)
Date: Mon, 5 Aug 2002 12:00:20 -0400 (EDT)
Cc: nanog@merit.edu
In-Reply-To: <20020805110344.T6708@netsys.com> from "Len Rose" at Aug 05, 2002 11:03:44 AM
From: <bdragon@gweep.net>
Errors-To: owner-nanog-outgoing@merit.edu
>
> Of course, I mean denial of service attacks using source routing, i.e. made
> possible by use of same. I guess I need to be semantically perfect and
> I don't always have a wonderful command of the english language it seems,
> but please grant that I'm not stupid.
>
> Thanks
I understood what you were saying, I just was not aware of any attacks
which used source routing.
I was, and am, asking for clarification on that.
Is it just a simple "overwhelm the router with whatever ip options I can"
type attack? Or are you aware of people actively using source routing
to get around weak defenses? Something else?