(no subject)

Date: 2008-08-28 07:02 pm (UTC)
The reason I'm not worried about it is that exploiting this can't be done from just anywhere.

For one thing, you can't just fire up BGP on any Internet host and expect to get another host to peer with you. In fact, most BGP hosts are configured with their intended peers, and authenticate them to boot. Real routers tend to have extensive route filters configured, and the backbone more or less refuses to accept long prefixes. Furthermore, BGP packets are blocked on a lot of links.

Another issue is that it's pretty likely to be noticed, despite the researchers' claims to the contrary. What you're effectively doing is creating a backhaul of all the data for the network under attack. Most of the data will end up being hairpinned at the snooping point, and providers keep a careful eye out for that (because it costs them a lot of unnecessary money). In general, there is a lot of scrutiny of worldwide BGP activity; the data is public and can show a lot of useful (and, often, financially profitable) trends.

The danger in this kind of attack isn't so much from script kiddies as from governments and other deep-pockets organizations. They can afford the bandwidth requirements, as well as the many and widely connected links needed to avoid hairpinning. And, of course, they will be running BGP legitimately to connect up those big, complicated networks.

[Disclaimer: although I work on packet forwarding in large routers, I wouldn't consider myself a real expert in routing protocols. I do know a bit, though.]
(will be screened)
(will be screened if not validated)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

Profile

jducoeur: (Default)
jducoeur

July 2025

S M T W T F S
  12345
6789101112
13141516171819
20212223242526
27 28293031  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags