[83036] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Your router/switch may be less secure than you think

daemon@ATHENA.MIT.EDU (Michael Loftis)
Wed Aug 3 14:10:43 2005

Date: Wed, 03 Aug 2005 12:09:51 -0600
From: Michael Loftis <mloftis@wgops.com>
To: nanog@merit.edu
In-Reply-To: <OF414B6824.C5499A02-ON80257052.00479ACC-80257052.00485791@radianz.com>
X-MailScanner-From: mloftis@wgops.com
Errors-To: owner-nanog@merit.edu




--On August 3, 2005 2:10:10 PM +0100 Michael.Dillon@btradianz.com wrote:

<...>

> Contrary to what some may be worrying about, it it not the GSRs
> that are most at risk. It is those old 2500's that are connected to
> your customers. Imagine that one of those customer routers is
> exploited, the hacker installs a tunnel, and then proceeds to
> anonymously probe the customer's network. This is the real risk
> and it may very well be happening right now to one of your customers.

While I hate to possibly give ideas to (real) black hats in a public form 
but no doubt some have thought of this anyway....injecting routes into BGP 
to steal traffic.  A crafty enough person could move traffic back over a 
tunnel or series of tunnels to be snooped.  Yes, theoretically, it'd be 
noticed fairly soon, but how quickly is soon enough for $xyz critical 
application?  That worries me more, because it only takes one insecure 
unfiltered setup (or even partially unfiltered setup) to announce something 
they shouldn't.  Hopefully it wouldn't be global-reaching, but, it could 
be.  How much do you trust your peers?  How much should you?  How much do 
you have to?  For customers, it's obvious, for transit peers, maybe less so.

Just my two cents worth...

<...>



home help back first fref pref prev next nref lref last post