[nsp-sec] Black Hat Amsterdam - BGP, MPLS attack tools released
Smith, Donald
Donald.Smith at qwest.com
Fri Apr 17 10:05:01 EDT 2009
Anyone with "access to the carriers network" can already do MITM games including sniffing and injection.
Donald.Smith at qwest.com<mailto:Donald.Smith at qwest.com>
Please cc the handlers to keep them all in the loop.
________________________________
From: nsp-security-bounces at puck.nether.net [nsp-security-bounces at puck.nether.net] On Behalf Of jose nazario [jose at arbor.net]
Sent: Friday, April 17, 2009 7:21 AM
To: NSP nsp-security
Subject: [nsp-sec] Black Hat Amsterdam - BGP, MPLS attack tools released
----------- nsp-security Confidential --------
http://www.theregister.co.uk/2009/04/16/internet_backbone_hacking/
Classic BlackHat presentation, laying out some tools etc.
> Some of the new tools attack a network data-forwarding technology known as
> MPLS, or multiprotocol label switching. Carriers such as Verizon, AT&T and
> Sprint use it to segregate one corporate customer's traffic from another's as
> it's shuttled from one geographic region to another. The tools make it trivial
> for anyone with access to the carrier's network to redirect that traffic or
> alter data on it.
>
> The software works because MPLS has no mechanism for protecting the integrity
> of the headers that determine where a data packet should be delivered.
-- jose
_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security
Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
community. Confidentiality is essential for effective Internet security counter-measures.
_______________________________________________
More information about the nsp-security
mailing list