nanog mailing list archives
Re: Cisco vulnerability and dangerous filtering techniques
From: Valdis.Kletnieks () vt edu
Date: Tue, 22 Jul 2003 17:53:45 -0400
On Tue, 22 Jul 2003 17:51:20 EDT, alex () yuriev com said:
I guess all folks with Ph.D. at Akamai really are paid for nothing if a virus could calculate that with a few traceroutes.
It's actually pretty easy if you get 20K distributed zombies doing the traceroutes and then distributing the data to each other. Given that data, it's pretty easy to compute the graph - every router running BGP has to do similar. :) The Akamai problem is how to do it *without* having 20K boxes doing traceroutes. ;)
Attachment:
_bin
Description:
Current thread:
- RE: Cisco vulnerability and dangerous filtering techniques, (continued)
- RE: Cisco vulnerability and dangerous filtering techniques McBurnett, Jim (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques jgraun (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques Austad, Jay (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Chris Lewis (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques alex (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques Austad, Jay (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Steve (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques alex (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Richard A Steenbergen (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Patrick W. Gilmore (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques Steve (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques McBurnett, Jim (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques Patrick W. Gilmore (Jul 23)
- RE: Cisco vulnerability and dangerous filtering techniques alex (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques Scott McGrath (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques Patrick W. Gilmore (Jul 23)