nanog mailing list archives
Re: If you have nothing to hide
From: <bdragon () gweep net>
Date: Mon, 5 Aug 2002 12:00:20 -0400 (EDT)
Of course, I mean denial of service attacks using source routing, i.e. made possible by use of same. I guess I need to be semantically perfect and I don't always have a wonderful command of the english language it seems, but please grant that I'm not stupid. Thanks
I understood what you were saying, I just was not aware of any attacks which used source routing. I was, and am, asking for clarification on that. Is it just a simple "overwhelm the router with whatever ip options I can" type attack? Or are you aware of people actively using source routing to get around weak defenses? Something else?
Current thread:
- Re: If you have nothing to hide, (continued)
- Re: If you have nothing to hide Paul Vixie (Aug 03)
- Re: If you have nothing to hide Sean Donelan (Aug 04)
- Message not available
- Re: If you have nothing to hide Dave Crocker (Aug 04)
- Re: If you have nothing to hide Sean Donelan (Aug 04)
- Re: If you have nothing to hide Scott Weeks (Aug 05)
- Message not available
- Re: If you have nothing to hide Dave Crocker (Aug 04)
- Re: If you have nothing to hide bmanning (Aug 05)
- Re: If you have nothing to hide Len Rose (Aug 05)
- Re: If you have nothing to hide bdragon (Aug 05)
- Re: If you have nothing to hide Len Rose (Aug 05)
- Re: If you have nothing to hide bdragon (Aug 05)
- Re[2]: If you have nothing to hide Richard Welty (Aug 05)
- Re: If you have nothing to hide Paul Vixie (Aug 03)
- Re: If you have nothing to hide Stephen Sprunk (Aug 05)
- Re: If you have nothing to hide Valdis . Kletnieks (Aug 05)
- Re: If you have nothing to hide Jeffrey Haas (Aug 05)
- Re: If you have nothing to hide Gerardo A. Gregory (Aug 05)
- Re: If you have nothing to hide Sean Donelan (Aug 06)
- Re: If you have nothing to hide fingers (Aug 05)
- Re: If you have nothing to hide Henry Yen (Aug 05)