#BGP
Joli, un des rares cas dans la table de routage mondiale où l'origine est un AS_SET (ici à trois AS) : https://mastodon.gougere.fr/@bgp/114375106512755449
#BGP
Joli, un des rares cas dans la table de routage mondiale où l'origine est un AS_SET (ici à trois AS) : https://mastodon.gougere.fr/@bgp/114375106512755449
Oulah, la doc' #BGP de Huawei qui dit que dans un AS_SET (un ensemble, au sens mathématique du terme), les AS sont dans un ordre aléatoire. Non, Huawei, ils ne sont pas ordonnés, c'est la définition d'un ensemble.
oh, hey, AS8298 hit 1M IPv4 routes in the FIB today. Happy Easter!
What do you guys do with your left-over (public) IPv4 addresses? And no, that’s meant for real :)
#routage #BGP Un million de routes dans l'Internet bientôt ?
https://www.bortzmeyer.org/un-million-de-routes.html
% curl -s https://bgp.bortzmeyer.org/info
OK: 1031455 IPv4 prefixes, 231602 IPv6 prefixes, 84853 AS
Wow, so much routes, amazing.
After a fair bit of tinkering in between things I’ve finally gotten my BGP bits sorted properly and sending announcements up to my peer, some further filters adjusted in the peers link to the carriers and I’m now routable to the world!
Oops! The MXP01 (Italy) peer had some fuck ups, followed by some insane traffic f*ckups at 3AM & 6AM on the other instances.
Rule Nr. 1: Even changing a single character can result in f*ckups. Always test!
@pmevzek @TheGibson
I would put more thought into how all of this can be attacked and/or abused.
It is always DNS. It is always BGP.
@fleaz : it's not MultiMultiFactorAuthentication but 1FA max.
Assuming that you don't use those hardware keys to generate TOTP codes (which are pointless when confronted with the likes of #Evilginx2), but use WebAuthn instead (FIDO2 passkeys in hardware keys), everything depends on one factor: the domain name of the website.
DV-CERTS SUCK
It is not very common that certificates are issued to malicious parties, but it *does* happen now and then (https://infosec.exchange/@ErikvanStraten/112914050216821746).
SUBDOMAINS
Furthermore, sometimes organizations have "dangling" subdomain names. For example,
test.example.com
may point to the IP-adress of some cloud server no longer used by example.com. Anyone with write access to that server may install a fake "test.example.com" website and phish you to it. It *may* be used to phish your WebAuthm credentials *if* "example.com" does not explicitly *DENY* WebAuthn from "test.example.com".
See https://github.com/w3ctag/design-reviews/issues/97#issuecomment-175766580 for how Google prevents "sites.google.com" from authenticating to "google.com".
DNS HACKED
It may not be neccessary to execute BGP-hijacks to redirect network traffic to an impostor: it also all depends on how reliable DNS records are protected against unauthorized access. If the dude in charge for DNS uses a stupid password only, or the DNS provider is easily fooled into believing "I forgot my creds", it's game over. The crooks will obtain a DV-cert in no time, no questions asked, for free.
All the bells and whistless are moot if there's an alternative way to log in (such as by using a 1FA rescue code) and the user is fooled into providing it (after they've been lied to that their WebAithn public key on the server became corrupted or was lost otherwise).
Cloudflare MitM's https connections (it's not a secret: https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/). The same applies to any server you log in to, which is accessible by untrustworthy personnel. They can steal your session cookie.
In the end MFA/2FA is a hoax anyway, because the session cookie (or JWT or whatever) is 1FA anyway.
Did I mention the risks of account lockout with hardware keys that cannot be backupped? And the mess it is to keep at least one other hardware key synchronized if it's in a vault? And the limitation of, for example, 25 WebAuthn accounts max? And (unpatcheable) vulnerabilities found in hardware keys? And their price? And how easy it is to forget or loose them?
Association entre adresse IP et AS
Dans les discussions au sujet du réseau Internet, on voit souvent passer des demandes sur l'AS associé à une adresse IP ou bien le contraire. Mais les questions simples du genre « de quel AS dépend une adresse IP ? » sont… trop simples.
The latest version of bgpkit-broker, v0.7.10, is out now! This update includes support for the route-views8 collector and introduces a new feature to dynamically verify missing collectors. We also resolved an issue that might lead to API crashes and tidied up the library dependencies. #BGP https://buff.ly/g6swlDr
#Cisco #IOS #XR flaw allows attackers to crash #BGP process on routers
https://securityaffairs.com/175421/security/cisco-ios-xr-flaw-cve-2025-20115.html
#securityaffairs #hacking