Re: BGP IP prefix hijack detection times

2017-02-27 Thread Nagarjun Govindraj via NANOG
The Goal is not to mitigate or take action against the malicious activity. Goal is to detect the hijacking event by trying to reduce false posivites as much as possible. I know false positives is one of the key factor to consider. I am just trying to distinguish between a legitimate advertisement a

Re: BGP IP prefix hijack detection times

2017-02-27 Thread Hank Nussbacher
On 28/02/2017 07:15, Nagarjun Govindraj via NANOG wrote: So what if you detect in 1.4 minutes of 3.1 minutes? Or even 8 minutes? What then? You certainly couldn't do anything to prevent it after 3.1 minutes. First you need to analyze whether the BGP hijack is a false positive or not. Could be t

Re: BGP IP prefix hijack detection times

2017-02-27 Thread Christopher Morrow
On Tue, Feb 28, 2017 at 12:15 AM, Nagarjun Govindraj < nagarjun.govind...@imaginea.com> wrote: > > Well, the idea behind the mail was to know if anyone in the community are > doing real time BGP IP prefix hijacking. > Like Artemis detection tool claims to be detecting in 1.4 ~ 3.1 minutes. > So I

Re: BGP IP prefix hijack detection times

2017-02-27 Thread Nagarjun Govindraj via NANOG
Well, the idea behind the mail was to know if anyone in the community are doing real time BGP IP prefix hijacking. Like Artemis detection tool claims to be detecting in 1.4 ~ 3.1 minutes. So I wanted to know if anyone in the community are using such tools for detecting hijacks, if yes how much time

Re: BGP IP prefix hijack detection times

2017-02-27 Thread Nick Hilliard
Christopher Morrow wrote: > Also: "How reliable are the alerts being sent?" also: do the smtp servers which handle mail for the domain of the alerting email address use the IP address space as they're notifying about? Nick

Re: BGP IP prefix hijack detection times

2017-02-27 Thread Christopher Morrow
Also: "How reliable are the alerts being sent?" On Mon, Feb 27, 2017 at 12:19 PM, Christopher Morrow < morrowc.li...@gmail.com> wrote: > you probably want to ask the people that make these systems, yes? > > On Sun, Feb 26, 2017 at 7:12 AM, Nagarjun Govindraj via NANOG < > nanog@nanog.org> wrote:

Re: BGP IP prefix hijack detection times

2017-02-27 Thread Christopher Morrow
you probably want to ask the people that make these systems, yes? On Sun, Feb 26, 2017 at 7:12 AM, Nagarjun Govindraj via NANOG < nanog@nanog.org> wrote: > Hi Nanog, > > what are the detection times for BGP IP prefix hijack detection systems > adopted by community members/operators (if any) ? > >

Re: SHA1 collisions proven possisble

2017-02-27 Thread Chris Adams
Once upon a time, valdis.kletni...@vt.edu said: > There's only 2 certs. You generate 2 certs with the same hash, and *then* get > the CA to sign one of them. The point is that the signed cert you get back from the CA will have a different hash, and the things that they change that cause the hash

Re: SHA1 collisions proven possisble

2017-02-27 Thread valdis . kletnieks
On Mon, 27 Feb 2017 07:23:43 -0500, Jon Lewis said: > On Sun, 26 Feb 2017, Keith Medcalf wrote: > > > So you would need 6000 years of computer time to compute the collision > > on the SHA1 signature, and how much additional time to compute the > > trapdoor (private) key, in order for the cert to be

RE: SHA1 collisions proven possisble

2017-02-27 Thread Jon Lewis
On Sun, 26 Feb 2017, Keith Medcalf wrote: So you would need 6000 years of computer time to compute the collision on the SHA1 signature, and how much additional time to compute the trapdoor (private) key, in order for the cert to be of any use? 1) Wasn't the 6000 years estimate from an article

Re: SHA1 collisions proven possisble

2017-02-27 Thread valdis . kletnieks
On Mon, 27 Feb 2017 01:15:28 -0500, "Patrick W. Gilmore" said: > In the example above, the CA knows the SHA-1 hash of the cert it issued. (We > are assuming there is a CA which still does SHA-1.) How do you get that CA to > believe the two OTHER certs with DIFFERENT hashes you have to create so yo

Re: SHA1 collisions proven possisble

2017-02-27 Thread Randy Bush
> 1. Create a certificate C[ert] for a single domain you control with hash h(c). > 2. Create a second certificate A[ttack] marked as a certificate >authority such that h(C) = h(A). > 3. Have a certificate authority sign cert C > 4. Present the signature for A along with A for whatever nefarious