nanog mailing list archives

RE: BGP Battleships


From: Dennis Burgess <dmburgess () linktechs net>
Date: Thu, 24 May 2018 13:18:29 +0000

MikroTik Official Response: 

Cisco informed us on May 22nd of 2018, that a malicious tool was found on several manufacturer devices, including three 
devices made by MikroTik. We are highly certain that this malware was installed on these devices through a 
vulnerability in MikroTik RouterOS software, which was already patched by MikroTik in March 2017. Simply upgrading 
RouterOS software deletes the malware, any other 3rd party files and closes the vulnerability. Let us know if you need 
more details. Upgrading RouterOS is done by a few clicks and takes only a minute.

https://forum.mikrotik.com/viewtopic.php?f=21&t=134776&p=663825#p663825

Dennis Burgess, MikroTik Certified Trainer

-----Original Message-----
From: NANOG <nanog-bounces () nanog org> On Behalf Of Mark Tinka
Sent: Thursday, May 24, 2018 3:44 AM
To: surfer () mauigateway com; nanog () nanog org
Subject: Re: BGP Battleships

So the moral of the story is... "former Level(3)" must step into the bar and have a beer with the rest of us :-)?

Mark.

On 23/May/18 22:53, Scott Weeks wrote:

I saw the below on SWINOG and thought it might add some fun in the 
middle of all this General Data Protection Regulation conversation. :)

scott


--- Begin forwarded message:

From: Gregor Riepl <onitake () gmail com>
To: swinog () lists swinog ch
Subject: [swinog] BGP Battleships
Date: Tue, 22 May 2018 23:18:51 +0200

Some good ol' fun with BGP:

https://imsva91-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=http
s%3a%2f%2fblog.benjojo.co.uk%2fpost%2fbgp%2dbattleships&umid=11F39436-
6CEF-A905-AF98-203A0AD563EA&auth=079c058f437b7c6303d36c6513e5e8848d0c5
ac4-9d1558ea3856dddcaa08f2ee54a6060b4ee27e65

Please (don't?) try this at home!




.



Current thread: