[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

NANOG 44 (Los Angeles): ISP Security BOF



Hi all,

Well, Esthost has decided that they no longer wish to present their  
side of the story, and so their talk has been removed from the  
agenda :-)

This also means that that the more, erm,  operational talks have been  
lengthened and so won't feel quite as rushed...

The revised agenda is below:

4:30 - 4:50: "Stealing the Internet" -- Anton Kapela
--------------------------------------

4:50 - 5:10: "An interim solution to the threat of DNS cache poisoning  
while waiting for DNSSEC". -- Rodney Joffe

--------------------------------------

5:10 - 5:30: "Next steps in IRR/X509" --Barry Raveendran Greene, Jason  
Schiller.

--------------------------------------

5:30 - 5:50: "Early Survey Results and Some Attack Statistics" --   
Danny McPherson.


I will get this (with some abstracts) posted on the NANOG 44 site soon.

Thanks to everyone who will be presenting, and I look forward to  
seeing y'all there!

W


On Oct 6, 2008, at 2:05 PM, Warren Kumari wrote:

> Hello all,
>
> NANOG 44 is now less than a week away.
> Here is the current program for the ISP Security BOF (NANOG 44,  
> October 13, 2008, 4:30 PM - 6:00 PM) -- as always, the program at  
> this point is still somewhat fluid and subject to change.
>
> ------------------------------------
> 16:30 - 16:45: "Stealing the Internet" -- Anton Kapela
>
> In "Stealing the Internet" Kapela will describe a method where an
> attacker exploits the BGP routing system to facilitate transparent  
> interception of IP packets.
> The method will be shown to function at a scale previously thought  
> by many as unavailable.
> The talk highlights a new twist in sub-prefix hijacking that he  
> demonstrated at Defcon 16:
> using intrinsic BGP logic to hijack network traffic and  
> simultaneously create a 'bgp shunt towards
> the target network. This method will be shown to preserve end-to-end  
> reachability while creating
> a virtual 'wire tap' at the attackers network. He'll cover additive  
> TTL modification and
> transparent-origin-AS as a means for the attacker to obscure the  
> interception.
>
> There will not be a live demonstration of the hijack or interception
> methods.
>
> --------------------------------------
>
> 16:45 - 17:00: "An interim solution to the threat of DNS cache  
> poisoning while waiting for DNSSEC". -- Rodney Joffe
>
> --------------------------------------
>
> 17:00 - 17:15: "Next steps in IRR/X509" --Barry Raveendran Greene,  
> Jason Schiller.
>
> -------------------------------------
>
> 17:15 - 17:30: "Esthost's response to the 'Hostexploit report'" --  
> Konstantin Poltev (Esthost, Inc).
>
> We are still waiting for the official title / abstract for this  
> talk, so this is a temporary title....
>
> ------------------------------------
>
> 17:30 - 17:45: "Early Survey Results and Some Attack Statistics" --   
> Danny McPherson.
>
> -------------------------------------
>
> There are 15 minutes left over at the end of the agenda as I'm sure  
> some talks will run over their alloted time.
>
> Hopefully this agenda is interesting and you are looking forward to  
> the BOF....
>
>
> See you there,
> W
>
>