[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
huawei
- Subject: huawei
- From: bill at herrin.us (William Herrin)
- Date: Thu, 13 Jun 2013 18:45:18 -0400
- In-reply-to: <CAMrdfRxTv6X5dwa-yhBa1oZhnarfmXr7=Y3RZMBQePKkuqfndw@mail.gmail.com>
- References: <2116700651-1371140872-cardhu_decombobulator_blackberry.rim.net-420291214-@b4.c20.bise6.blackberry> <[email protected]> <[email protected]> <CAGWRaZZduutFiwNTSSR=uHayKCr_1ZKcWaBhQMTEA5xdB4zkQA@mail.gmail.com> <CAMrdfRxTv6X5dwa-yhBa1oZhnarfmXr7=Y3RZMBQePKkuqfndw@mail.gmail.com>
On Thu, Jun 13, 2013 at 1:20 PM, Scott Helms <khelms at zcorum.com> wrote:
> if one of my routers starts sending cat
> photos somewhere, no matter how cute, I'm gonna consider that suspicious.
Hi Scott,
If once every 24 hours or so your router borrows the source IP of a
packet it recently passed and uses it to send a burst of 20
intentionally unacknowledged packets containing a cat photo, your odds
of noticing are very close to zero and your odds of tracing it to the
router are even worse.
Implementing a magic-packet remote kill switch is even easier... and
completely undetectable until used. With a little effort you could
implement it in the forwarding hardware where even a thorough analysis
of the firmware image can't detect it.
Regards,
Bill Herrin
--
William D. Herrin ................ herrin at dirtside.com bill at herrin.us
3005 Crane Dr. ...................... Web: <http://bill.herrin.us/>
Falls Church, VA 22042-3004
- Follow-Ups:
- huawei
- From: khelms at zcorum.com (Scott Helms)
- References:
- huawei
- From: patrick at ianai.net (Patrick W. Gilmore)
- huawei
- From: mike at mtcc.com (Michael Thomas)
- huawei
- From: symack at gmail.com (Nick Khamis)
- huawei
- From: khelms at zcorum.com (Scott Helms)