Questions tagged [bgp]

10 questions
11
votes
2 answers

Sophisticated DDOS attack

According to this article, ProtonMail was the victim of a very sophisticated DDOS attack. "At 2pm there was a dramatic escalation," said Yen. According to Yen and Gargula the attackers smacked 15 different ISP nodes simultaneously, then attacked…
limbenjamin
  • 3,944
  • 50
  • 72
  • 1,281
3
votes
2 answers

What is Multi-Perspective Validation?

The Let's Encrypt upcoming features page lists the following: Multi-Perspective Validation Currently Let’s Encrypt validates from a single network perspective. We are planning to start validating from multiple network perspectives. I haven't…
2
votes
1 answer

How does anycast ensure reliable delivery of IP packets for the same IP address on different locations?

With anycast, it would be possible to have the same IP address at multiple locations in the world, without the need of a proxy or VPN that forwards the packets to its final destination. If you would just use IP spoofing to change the source IP…
Jomad
  • 21
  • 2
1
vote
1 answer

Why is GRE tunneling is needed when having a BGP based solution against DDoS?

I understand that GRE tunneling is very handy when sending the data back to the client after scrubbing because it's designed to ensure that the data is sent reliably by initiating a private point-to-point connection. My question is, why is this…
user168683
1
vote
1 answer

Is it possible that a Peer AS over BGP can sniff other AS traffic?

Is it possible that one AS can sniff another peer's traffic?
1
vote
2 answers

What can I do to prevent BGP hijacking as an admin of some OVH's VPS?

I am an operator of some public service which is run on some OVH's VPS. Recently I was contacted by an anonymous contact, who suggested that the service was BGP-hijacked and some sensitive info of users may have been leaked (although all passwords,…
1
vote
0 answers

Hosting companies by AS Number

Is there any website out the like bgp.he.net (Hurricane Electric) or ipv4info.com that has a database with all VPS/Dedicated Server comapnies filtered by AS Number? I know that there are plenty of websites which have a database of predefined list of…
node01
  • 11
  • 2
1
vote
1 answer

man in the middle attack over internet

I've performed some man in the middle attacks (arp poisoning) using ettercap, stuffs on kali linux and i know how exactly it is working. but i was wondering if this attack could be even performed over internet ?! like poisoning clients on a router…
user106957
0
votes
1 answer

Protecting against BGP hijacking

I'm living in a very evil country and don't trust my ISP or the government. Moreover the country has control of several root and probably more intermediate certificate authorities. What options do I have as a normal end user with a DSL or cable…
-1
votes
1 answer

Why governments use spywares instead of just redirecting traffic to their own servers by announcing a new path on BGP?

I was reading about The Hacking Team on Wikipedia. It produces "offensive intrusion and surveillance capabilities" and sells it to "to governments, law enforcement agencies". Its spyware allows governments "to monitor the communications of internet…
robertspierre
  • 495
  • 2
  • 11