Re: Revealed: The Internet's Biggest Security Hole
Yes, wonderful preso! My biggest take-away was the fact that the vast majority of the attendees did not understand the gravity of the demo. The same thing could be said about Dan's talk. It was over the heads of most attendees. Marc ------Original Message------ From: Gadi Evron To: Sachs, Marcus H. (Marc) Cc: fsmendoza@gmail.com Cc: nanog@merit.edu Sent: Aug 27, 2008 21:42 Subject: Re: Revealed: The Internet's Biggest Security Hole On Wed, 27 Aug 2008 marcus.sachs@verizon.com wrote:
Nothing will change. You think DNSSEC is hard? Try getting support for the deployment of S-BGP or soBGP. Without a trust anchor and lots of community support it will remain largely an academic interest area.
I guess it will just remain a "cool" presentation than, and boy was it cool. You were there, any special impressions? Gadi.
Marc
------Original Message------ From: Gadi Evron To: Frank Cc: NANOG list Sent: Aug 27, 2008 20:54 Subject: Re: Revealed: The Internet's Biggest Security Hole
hehe "new". hehe
Maybe something will change now' though, it was a great and impressive presentation, hijacking the defcon network and tweaking TTL to hide it.
On Thu, 28 Aug 2008, Frank wrote:
http://blog.wired.com/27bstroke6/2008/08/revealed-the-in.html
Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency.
The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination.
The demonstration is only the latest attack to highlight fundamental security weaknesses in some of the internet's
------Original Message Truncated------ -------------------------- Marcus H. Sachs Verizon 202 515 2463 Sent from my BlackBerry
On Wed, Aug 27, 2008 at 9:52 PM, <marcus.sachs@verizon.com> wrote:
Yes, wonderful preso! My biggest take-away was the fact that the vast majority of the attendees did not understand the gravity of the demo.
Agreed on both counts: the presentation was great, and largely not understood it seemed.
hehe "new". hehe
Maybe something will change now' though, it was a great and impressive presentation, hijacking the defcon network and tweaking TTL to hide it.
Notably, Alex and Tony both mentioned that the BGP tricks were not new during the presentation, and commented that it would essentially not be surprising to anyone that groks routing at the level that most of the folks on this list does. What was new though according to their presentation (and it was new to me certainly, but I'm still fairly green) was the AS Path prepending to complete the circuit, and as you mentioned, the TTL magicks to hide the hops. I was suitably impressed at that. -- Jason
participants (2)
-
Jason Ross
-
marcus.sachs@verizon.com