[59833] in North American Network Operators' Group
RE: Cisco vulnerability and dangerous filtering techniques
daemon@ATHENA.MIT.EDU (Austad, Jay)
Tue Jul 22 17:01:24 2003
From: "Austad, Jay" <JAustad@temgweb.com>
To: "'alex@yuriev.com'" <alex@yuriev.com>,
"Austad, Jay" <JAustad@temgweb.com>
Cc: nanog@merit.edu
Date: Tue, 22 Jul 2003 16:00:22 -0500
Errors-To: owner-nanog-outgoing@merit.edu
It could poll different looking glasses...
> -----Original Message-----
> From: alex@yuriev.com [mailto:alex@yuriev.com]
> Sent: Tuesday, July 22, 2003 4:01 PM
> To: Austad, Jay
> Cc: nanog@merit.edu
> Subject: RE: Cisco vulnerability and dangerous filtering techniques
>
>
> > I was thinking about this the other day. The most
> efficient way to make
> > this work would be to spread using some vulnerability (like
> the Microsoft
> > DCOM vulnerability released last week), and then at a
> predetermined time,
> > start DoS'ing routers in the IP space of major providers,
> and then work your
> > way towards the "edges."
>
> Pray tell, the virus will also get BGP feeds to determine
> where the edges
> are?
>
> Alex
>
>