[sidr] Fwd: I-D Action: draft-foo-sidr-simple-leak-attack-bgpsec-no-help-00.txt

Danny McPherson <danny@tcb.net> Wed, 16 November 2011 09:54 UTC

Return-Path: <danny@tcb.net>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B94F21F9619 for <sidr@ietfa.amsl.com>; Wed, 16 Nov 2011 01:54:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 87SNsXULD87t for <sidr@ietfa.amsl.com>; Wed, 16 Nov 2011 01:54:20 -0800 (PST)
Received: from dog.tcb.net (dog.tcb.net [64.78.150.133]) by ietfa.amsl.com (Postfix) with ESMTP id DC19121F9615 for <sidr@ietf.org>; Wed, 16 Nov 2011 01:54:20 -0800 (PST)
Received: by dog.tcb.net (Postfix, from userid 0) id 5E05F268063; Wed, 16 Nov 2011 02:54:20 -0700 (MST)
Received: from dhcp-1267.meeting.ietf.org (dhcp-1267.meeting.ietf.org [130.129.18.103]) (authenticated-user smtp) (TLSv1/SSLv3 AES128-SHA 128/128) by dog.tcb.net with SMTP; for sidr@ietf.org; Wed, 16 Nov 2011 02:54:19 -0700 (MST) (envelope-from danny@tcb.net)
From: Danny McPherson <danny@tcb.net>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Wed, 16 Nov 2011 04:54:01 -0500
References: <20111116095300.22121.699.idtracker@ietfa.amsl.com>
To: sidr wg list <sidr@ietf.org>
Message-Id: <DCA9E42B-07CB-4AA7-8A77-E71276354C24@tcb.net>
Mime-Version: 1.0 (Apple Message framework v1084)
X-Mailer: Apple Mail (2.1084)
Subject: [sidr] Fwd: I-D Action: draft-foo-sidr-simple-leak-attack-bgpsec-no-help-00.txt
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Nov 2011 09:54:21 -0000

	
FYI - per request in SIDR yesterday..

-danny


Begin forwarded message:

> From: internet-drafts@ietf.org
> Date: November 16, 2011 4:53:00 AM EST
> To: i-d-announce@ietf.org
> Subject: I-D Action: draft-foo-sidr-simple-leak-attack-bgpsec-no-help-00.txt
> Reply-To: internet-drafts@ietf.org
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> 
> 	Title           : Route Leak Attacks Against BGPSEC
> 	Author(s)       : Danny McPherson
>                          Shane Amante
> 	Filename        : draft-foo-sidr-simple-leak-attack-bgpsec-no-help-00.txt
> 	Pages           : 8
> 	Date            : 2011-11-16
> 
>   This document describes a very simple attack vector that illustrates
>   how RPKI-enabled BGPSEC machinery as currently defined can be easily
>   circumvented in order to launch a Man In The Middle (MITM) attack via
>   BGP.  It is meant to serve as input to the SIDR WG during routing
>   security requirements specification and discussions, and secure
>   routing protocol designs.
> 
> 
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-foo-sidr-simple-leak-attack-bgpsec-no-help-00.txt
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> This Internet-Draft can be retrieved at:
> ftp://ftp.ietf.org/internet-drafts/draft-foo-sidr-simple-leak-attack-bgpsec-no-help-00.txt
> 
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt