nanog mailing list archives
Re: Cisco vulnerability and dangerous filtering techniques
From: Richard A Steenbergen <ras () e-gerbil net>
Date: Wed, 23 Jul 2003 01:59:37 -0400
On Tue, Jul 22, 2003 at 05:53:45PM -0400, Valdis.Kletnieks () vt edu wrote:
On Tue, 22 Jul 2003 17:51:20 EDT, alex () yuriev com said:I guess all folks with Ph.D. at Akamai really are paid for nothing if a virus could calculate that with a few traceroutes.It's actually pretty easy if you get 20K distributed zombies doing the traceroutes and then distributing the data to each other. Given that data, it's pretty easy to compute the graph - every router running BGP has to do similar. :)
Sounds like said virus implementor should go into the optimized routing business. Personally I'm gonna call bullshit on that one until I see it done.
The Akamai problem is how to do it *without* having 20K boxes doing traceroutes. ;)
How many boxes does Akamai have? :) -- Richard A Steenbergen <ras () e-gerbil net> http://www.e-gerbil.net/ras GPG Key ID: 0xF8B12CBC (7535 7F59 8204 ED1F CC1C 53AF 4C41 5ECA F8B1 2CBC)
Current thread:
- Re: Cisco vulnerability and dangerous filtering techniques, (continued)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques jgraun (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques Austad, Jay (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Chris Lewis (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques alex (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques Austad, Jay (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Steve (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques alex (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Richard A Steenbergen (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Patrick W. Gilmore (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques Steve (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques Patrick W. Gilmore (Jul 23)
- RE: Cisco vulnerability and dangerous filtering techniques alex (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques Scott McGrath (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques Patrick W. Gilmore (Jul 23)