At Tue, 29 Nov 2016 21:08:11 -0500,
"John G. Scudder" <j...@juniper.net> wrote:
> 
> On Nov 29, 2016, at 9:02 PM, Chris Morrow <morr...@ops-netman.net> wrote:
> > Of course, just wiping out the prefixes in flight
> 
> Right, exactly. The OV "attack" is just a baroque version of
> underclaiming, only it's an inferior version because there's a
> greater audit trail.

yes.

> 
> > and stitching back
> > together the tcp session... same effect.
> 
> Not sure why you have to stitch back together the TCP session? I
> thought you were supposing the "attacker" was the edge node, it can
> just apply an export policy towards the core.
> 

say the case is inside your network, between the edge node in NYC and
the core nodes in BWI, something on the fiber path just removes/adds
information to the bgp stream.

baroque.

_______________________________________________
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to