[59833] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Cisco vulnerability and dangerous filtering techniques

daemon@ATHENA.MIT.EDU (Austad, Jay)
Tue Jul 22 17:01:24 2003

From: "Austad, Jay" <JAustad@temgweb.com>
To: "'alex@yuriev.com'" <alex@yuriev.com>,
	"Austad, Jay" <JAustad@temgweb.com>
Cc: nanog@merit.edu
Date: Tue, 22 Jul 2003 16:00:22 -0500
Errors-To: owner-nanog-outgoing@merit.edu


It could poll different looking glasses...  

> -----Original Message-----
> From: alex@yuriev.com [mailto:alex@yuriev.com]
> Sent: Tuesday, July 22, 2003 4:01 PM
> To: Austad, Jay
> Cc: nanog@merit.edu
> Subject: RE: Cisco vulnerability and dangerous filtering techniques
> 
> 
> > I was thinking about this the other day.  The most 
> efficient way to make
> > this work would be to spread using some vulnerability (like 
> the Microsoft
> > DCOM vulnerability released last week), and then at a 
> predetermined time,
> > start DoS'ing routers in the IP space of major providers, 
> and then work your
> > way towards the "edges."  
> 
> Pray tell, the virus will also get BGP feeds to determine 
> where the edges
> are?
> 
> Alex
> 
> 

home help back first fref pref prev next nref lref last post