[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Spoofing ASNs (Re: SNMP DDoS: the vulnerability you might not know you have)
- Subject: Spoofing ASNs (Re: SNMP DDoS: the vulnerability you might not know you have)
- From: fw at deneb.enyo.de (Florian Weimer)
- Date: Sun, 11 Aug 2013 18:14:28 +0200
- In-reply-to: <CAL9jLaZK0QKSh8GULf0UfPP3toFD=h2P1v3m4y4X18E76eU0+g@mail.gmail.com> (Christopher Morrow's message of "Sun, 11 Aug 2013 12:02:52 -0400")
- References: <CAJvB4t=MFhVNpmBwKdMrcc5ZCQkO1LSpNbsqtJu27WjQd=cpJA@mail.gmail.com> <CE1EA166.16075%[email protected]> <CAJvB4tngwy0rMwvnUSMkEYGPevE8wRBxZBGfKF8vjGA1JpEOHA@mail.gmail.com> <CA+2UFhksZz9Kb0LRO29STMzj-KZchD94ZxvqibMW=R8tAV_ufw@mail.gmail.com> <[email protected]> <CAJvB4tk2S=D+z_kn_6_tEpGiB2feYGbXTBhimtgZfZ5ikTB7yg@mail.gmail.com> <CAAAwwbWCSsp1a7U43NLU=fwMeGXrSUGZEm0ZVwSkiaEmRDKgXg@mail.gmail.com> <CA+2UFhntL-iKdGc7Ev9UbPB-y5QkO5eA=nxFfsmNMq50ZUkPqA@mail.gmail.com> <[email protected]> <[email protected]> <CAEmG1=o_E5K3n8MjmovCE7c2GsYELHX1fb_bsgKQZHFYt_E1oQ@mail.gmail.com> <[email protected]> <[email protected]> <[email protected]> <[email protected]> <CAL9jLaZK0QKSh8GULf0UfPP3toFD=h2P1v3m4y4X18E76eU0+g@mail.gmail.com>
* Christopher Morrow:
> On Sun, Aug 11, 2013 at 11:40 AM, Florian Weimer <fw at deneb.enyo.de> wrote:
>
>> Apparently, they're implementing DNS proxy by destination-NATting, and
>> because they listen also on the WAN interface, they get the source
>> address wrong.
>>
>> This is quite scary.
>
> which part? the fact that most NAT implementations on CPE are crap? or
> the spoofing bit?
The spoofing bit. Among other things, it makes the impact of CPE
crappiness non-localized.