[59832] in North American Network Operators' Group
RE: Cisco vulnerability and dangerous filtering techniques
daemon@ATHENA.MIT.EDU (alex@yuriev.com)
Tue Jul 22 16:44:07 2003
Date: Tue, 22 Jul 2003 17:00:44 -0400 (EDT)
From: alex@yuriev.com
To: "Austad, Jay" <JAustad@temgweb.com>
Cc: nanog@merit.edu
In-Reply-To: <288FAF5565A1A74EA5E35C39E7EE1D42077FE203@mail.temgweb.com>
Errors-To: owner-nanog-outgoing@merit.edu
> I was thinking about this the other day. The most efficient way to make
> this work would be to spread using some vulnerability (like the Microsoft
> DCOM vulnerability released last week), and then at a predetermined time,
> start DoS'ing routers in the IP space of major providers, and then work your
> way towards the "edges."
Pray tell, the virus will also get BGP feeds to determine where the edges
are?
Alex