[59838] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco vulnerability and dangerous filtering techniques

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Tue Jul 22 17:54:08 2003

To: alex@yuriev.com
Cc: nanog@merit.edu
In-Reply-To: Your message of "Tue, 22 Jul 2003 17:51:20 EDT."
             <Pine.LNX.4.10.10307221750360.12930-100000@s1.yuriev.com> 
From: Valdis.Kletnieks@vt.edu
Date: Tue, 22 Jul 2003 17:53:45 -0400
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_463628176P
Content-Type: text/plain; charset=us-ascii

On Tue, 22 Jul 2003 17:51:20 EDT, alex@yuriev.com said:

> I guess all folks with Ph.D. at Akamai really are paid for nothing if a
> virus could calculate that with a few traceroutes.

It's actually pretty easy if you get 20K distributed zombies doing the traceroutes
and then distributing the data to each other.  Given that data, it's pretty easy to
compute the graph - every router running BGP has to do similar. :)

The Akamai problem is how to do it *without* having 20K boxes doing traceroutes. ;)

--==_Exmh_463628176P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQE/HbJocC3lWbTT17ARAif7AKCNcZU7rPyC2R7e8HltKWMpAJ6XRQCfSGk9
yGMwxWOl/6H9FQeB+b7LI2c=
=HWdt
-----END PGP SIGNATURE-----

--==_Exmh_463628176P--

home help back first fref pref prev next nref lref last post