This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/[email protected]/
[anti-abuse-wg] Fwd: Hijack factory: AS201640 -- MEGA - SPRED LTD / Michael A. Persaud
- Previous message (by thread): [anti-abuse-wg] Fwd: Hijack factory: AS201640 -- MEGA - SPRED LTD / Michael A. Persaud
- Next message (by thread): [anti-abuse-wg] Fwd: Hijack factory: AS201640 -- MEGA - SPRED LTD / Michael A. Persaud
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Suresh Ramasubramanian
ops.lists at gmail.com
Fri Nov 14 13:47:24 CET 2014
On Mon, Nov 10, 2014 at 12:14 AM, Gert Doering <gert at space.net> wrote: > Now, enabling creation of database entries without authentication for > the good guys (because we had no idea how to *do* authentication for > these objects, the RPSL-dist-auth drafts didn't really fly) also enables > this attack angle. And Krebs weighs in with episode #2 - now with additional statements from RIPE NCC, and documenting the scale of this hijack. http://krebsonsecurity.com/2014/11/network-hijackers-exploit-technical-loophole/ --srs -- Suresh Ramasubramanian (ops.lists at gmail.com)
- Previous message (by thread): [anti-abuse-wg] Fwd: Hijack factory: AS201640 -- MEGA - SPRED LTD / Michael A. Persaud
- Next message (by thread): [anti-abuse-wg] Fwd: Hijack factory: AS201640 -- MEGA - SPRED LTD / Michael A. Persaud
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]