[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Revealed: The Internet's well known BGP behavior
- Subject: Revealed: The Internet's well known BGP behavior
- From: oleg.bogdanov at morganstanley.com (Bogdanov, Oleg (IT))
- Date: Thu, 28 Aug 2008 11:56:08 -0400
- In-reply-to: <[email protected]>
- References: <[email protected]>
First, thank you all for the usually intelligent/enlightening
discussion. My first post to this list and apologies in advance if
discussion of end point (customer) networks is off-topic:
I haven't seen the presentation that some of you have referred to. If
someone can provide a link that would be helpful. What is the
as-prepend piece of the puzzle? Insert AS numbers of ISPs in the path
from hijacker to intended recipient so snooped data doesn't boomerang
back to the hijacker (exploit BGP loop detection mechanism)?
Theoretically, can one hijack both sender and receiver space to get
inline on the whole conversation?
And maybe the more relevant question: Can the customer do anything?
What would my ISPs tell me if I asked them to take measures (magic
ones?) to mitigate my exposure?
Thanks,
Oleg Bogdanov
Morgan Stanley | Technology
1 Pierrepont Plaza, 12th Floor | Brooklyn, NY 11201
oleg.bogdanov at morganstanley.com
--------------------------------------------------------
NOTICE: If received in error, please destroy and notify sender. Sender does not intend to waive confidentiality or privilege. Use of this email is prohibited when received in error.