
Just a handful of traceroutes would give it enough information to start at a major backbone and work back towards itself. -SW
It could poll different looking glasses...
-----Original Message----- From: alex@yuriev.com [mailto:alex@yuriev.com] Sent: Tuesday, July 22, 2003 4:01 PM To: Austad, Jay Cc: nanog@merit.edu Subject: RE: Cisco vulnerability and dangerous filtering techniques
I was thinking about this the other day. The most efficient way to make this work would be to spread using some vulnerability (like the Microsoft DCOM vulnerability released last week), and then at a predetermined time, start DoS'ing routers in the IP space of major providers, and then work your way towards the "edges."
Pray tell, the virus will also get BGP feeds to determine where the edges are?
Alex