Revealed: The Internet's Biggest Security Hole

marcus.sachs at verizon.com marcus.sachs at verizon.com
Thu Aug 28 02:30:05 UTC 2008


I'll have to admit that the TTL manipulation was something I had not thought about. But why not?  If you are going to purloin EVERY packet then why not re-write byte 8 in every IP header to a value of your choosing? Very cool. 

Marc

------Original Message------
From: Jason Ross
To: Sachs, Marcus H. (Marc)
Cc: Gadi Evron
Cc: nanog at merit.edu
Sent: Aug 27, 2008 22:21
Subject: Re: Revealed: The Internet's Biggest Security Hole

On Wed, Aug 27, 2008 at 9:52 PM,  <marcus.sachs at verizon.com> wrote:
> Yes, wonderful preso!  My biggest take-away was the fact that the
> vast majority of the attendees did not understand the gravity of the
> demo.

Agreed on both counts: the presentation was great, and largely not
understood it seemed.

>>
>> hehe
>> "new". hehe
>>
>> Maybe something will change now' though, it was a great and
>> impressive presentation, hijacking the defcon network and tweaking
>> TTL to hide it.
>>

Notably, Alex and Tony both mentioned that the BGP tricks were not new
during the presentation, and commented that it would essentially not be
surprising to anyone that groks routing at the level that most of the
folks on this list does.

What was new though according to their presentation (and it was new to
me certainly, but I'm still fairly green) was the AS Path prepending to
complete the circuit, and as you mentioned, the TTL magicks to hide
the hops.

I was suitably impressed at that.

--
Jason


--------------------------
Marcus H. Sachs
Verizon
202 515 2463

Sent from my BlackBerry


More information about the NANOG mailing list