Revealed: The Internet's well known BGP behavior
fergdawg at netzero.net
Thu Aug 28 01:10:33 CDT 2008
-----BEGIN PGP SIGNED MESSAGE-----
- -- Hank Nussbacher <hank at efes.iucc.ac.il> wrote:
>At 11:32 PM 27-08-08 -0500, John Lee wrote:
>>Thanks guys, going back to my Comer one more time. My issue, question was
>> whether the organization doing the hijacking controlled all of the
>>routers in the new modified path or only some of them?
>>John (ISDN) Lee
>They didn't have control of any routers other than their own. What they
had to find is a single clueless upstream ISP that would allow them to
announce prefixes that didn't belong to them.
Trust is the major exploit here. That has never been "new".
- - ferg
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)
-----END PGP SIGNATURE-----
"Fergie", a.k.a. Paul Ferguson
Engineering Architecture for the Internet
ferg's tech blog: http://fergdawg.blogspot.com/
More information about the NANOG