NANOG 44 (Los Angeles): ISP Security BOF
Warren Kumari
warren at kumari.net
Wed Oct 8 13:43:33 UTC 2008
Hi all,
Well, Esthost has decided that they no longer wish to present their
side of the story, and so their talk has been removed from the
agenda :-)
This also means that that the more, erm, operational talks have been
lengthened and so won't feel quite as rushed...
The revised agenda is below:
4:30 - 4:50: "Stealing the Internet" -- Anton Kapela
--------------------------------------
4:50 - 5:10: "An interim solution to the threat of DNS cache poisoning
while waiting for DNSSEC". -- Rodney Joffe
--------------------------------------
5:10 - 5:30: "Next steps in IRR/X509" --Barry Raveendran Greene, Jason
Schiller.
--------------------------------------
5:30 - 5:50: "Early Survey Results and Some Attack Statistics" --
Danny McPherson.
I will get this (with some abstracts) posted on the NANOG 44 site soon.
Thanks to everyone who will be presenting, and I look forward to
seeing y'all there!
W
On Oct 6, 2008, at 2:05 PM, Warren Kumari wrote:
> Hello all,
>
> NANOG 44 is now less than a week away.
> Here is the current program for the ISP Security BOF (NANOG 44,
> October 13, 2008, 4:30 PM - 6:00 PM) -- as always, the program at
> this point is still somewhat fluid and subject to change.
>
> ------------------------------------
> 16:30 - 16:45: "Stealing the Internet" -- Anton Kapela
>
> In "Stealing the Internet" Kapela will describe a method where an
> attacker exploits the BGP routing system to facilitate transparent
> interception of IP packets.
> The method will be shown to function at a scale previously thought
> by many as unavailable.
> The talk highlights a new twist in sub-prefix hijacking that he
> demonstrated at Defcon 16:
> using intrinsic BGP logic to hijack network traffic and
> simultaneously create a 'bgp shunt towards
> the target network. This method will be shown to preserve end-to-end
> reachability while creating
> a virtual 'wire tap' at the attackers network. He'll cover additive
> TTL modification and
> transparent-origin-AS as a means for the attacker to obscure the
> interception.
>
> There will not be a live demonstration of the hijack or interception
> methods.
>
> --------------------------------------
>
> 16:45 - 17:00: "An interim solution to the threat of DNS cache
> poisoning while waiting for DNSSEC". -- Rodney Joffe
>
> --------------------------------------
>
> 17:00 - 17:15: "Next steps in IRR/X509" --Barry Raveendran Greene,
> Jason Schiller.
>
> -------------------------------------
>
> 17:15 - 17:30: "Esthost's response to the 'Hostexploit report'" --
> Konstantin Poltev (Esthost, Inc).
>
> We are still waiting for the official title / abstract for this
> talk, so this is a temporary title....
>
> ------------------------------------
>
> 17:30 - 17:45: "Early Survey Results and Some Attack Statistics" --
> Danny McPherson.
>
> -------------------------------------
>
> There are 15 minutes left over at the end of the agenda as I'm sure
> some talks will run over their alloted time.
>
> Hopefully this agenda is interesting and you are looking forward to
> the BOF....
>
>
> See you there,
> W
>
>
More information about the NANOG
mailing list