Re: BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks

2023-11-20 Thread Amir Herzberg
ve more specific examples, that would be appreciated. Thanks again, Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied Introduction to Cryptography'

Re: BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks

2023-11-20 Thread Amir Herzberg
er. But if not, then we'll see it in the conference :) best, Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied Introduction to Cryptography' te

Re: [External] announcing IPs by scrubbing service to help with DDoS attacks and ROAs

2023-11-17 Thread Amir Herzberg
efix would result in increased vulnerability to prefix hijacks. But if there's only a DDoS attack on the prefix and it's not being hijacked at the same time, then I think this practice may be fine - which would make such `emergency ROA' unnecessary. So that's very very useful feedbac

announcing IPs by scrubbing service to help with DDoS attacks and ROAs

2023-11-16 Thread Amir Herzberg
t to waste our time on presenting cute solutions to non-real problems :) So thanks for your help! Use your judgement if to respond on list or off list. Many thanks, Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homep

Re: BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks

2023-11-14 Thread Amir Herzberg
. And deployment and standardization are very important and challenging. BGP-iSec, at this point, is just an academic study studying some new ideas and evaluating their impact in specific configurations, under specific assumptions etc.; hopefully, this may provide some help to the community in impro

BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks

2023-11-10 Thread Amir Herzberg
rence - or just read the final version. Available from: https://www.researchgate.net/publication/375553362_BGP-iSec_Improved_Security_of_Internet_Routing_Against_Post-ROV_Attacks -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Conne

Re: swedish dns zone enumerator

2023-11-01 Thread Amir Herzberg
Randy, thanks for sharing, I didn't know this is actually done. Any idea if they use something clever or just exhaustive search? thanks Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.googl

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Amir Herzberg
ly. I wonder if anyone is using it , in fact. It would be nice to know if someone has the data handy. Thanks! Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Ap

Re: RPKI unknown for superprefixes of existing ROA ?

2023-10-22 Thread Amir Herzberg
rge `unknown' prefixes and super-prefixes of AS 0 ROAs - but either could be applied or even their conjunction) tks, Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home

RPKI unknown for superprefixes of existing ROA ?

2023-10-21 Thread Amir Herzberg
nce it's too large a prefix without ROA and in particular includes sub-prefixes with ROA, esp. ROA to AS 0? -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home

Re: ROV concern for hyper-specific prefixes (renamed from `Re: Smaller than a /24 for BGP?')

2023-01-30 Thread Amir Herzberg
ed in the `maxlength considered harmful' paper and RFC (RFC 9319), nothing really new here. Best, Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied In

ROV concern for hyper-specific prefixes (renamed from `Re: Smaller than a /24 for BGP?')

2023-01-30 Thread Amir Herzberg
so you get more instances of `invalid' announcements, making adoption of ROVs and ROAs harder. Just a thought... Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirhe

Question re prevention of enumeration with DNSSEC (NSEC3, etc.)

2022-05-06 Thread Amir Herzberg
ademic `exercise'? I'm really unsure about these questions - esp. the last one - and your feedback may help me decide on the importance of this line of research. Just fun or of possible practical importance? thanks and peace, Amir -- Amir Herzberg Comcast professor of Security Innov

Re: DMARC ViolationAS21299 - 46.42.196.0/24 ASN prepending 255 times

2022-03-25 Thread Amir Herzberg
lect the shorter path anyway, without need to filter out the long one, right? So, filtering announcements with many prepends may cause you to lose connectivity to these networks. Of course, you may not mind losing connectivity to Kazakhstan :) ... best, Amir > > > -- Amir Herzberg

off-topic: net-sec presentations (routing, DNS, and DoS)

2022-03-07 Thread Amir Herzberg
nough and nanog isn't the forum to discuss. Unless there's something you really think of interest to the entire community, of course. Peace (hopefully, in Ukraine too), Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, Univer

off-topic: applied crypto textbook - SSL/TLS chapter (and more)

2022-01-29 Thread Amir Herzberg
nd tell me off-list to avoid additionally bothering the list, I promise that I'll respect this feedback. best, Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home

Re: Need for historical prefix blacklist (`rogue' prefixes) information

2021-10-30 Thread Amir Herzberg
nst such TLAs, but I think it is legitimate for some people to be concerned. Best, Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied Introduction to Cr

Re: Need for historical prefix blacklist (`rogue' prefixes) information

2021-10-29 Thread Amir Herzberg
nd to me privately; if there are useful responses, >> I could post a summary to the list after few days (of collecting responses, >> if any). >> > > I would strongly encourage engaging with the IETF ( > https://datatracker.ietf.org/wg/sidrops/about/ et al) wh

Need for historical prefix blacklist (`rogue' prefixes) information

2021-10-28 Thread Amir Herzberg
y). thanks and regards... Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied Introduction to Cryptography' textbook and lectures: https://sites.google.c

Re: uPRF strict more

2021-09-28 Thread Amir Herzberg
thanks!) Amir -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied Introduction to Cryptography' textbook and lectures: https://sites.google.com/site/amirher

Re: Reminder: Never connect a generator to home wiring without transfer switch

2021-08-25 Thread Amir Herzberg
ndpa was a high-voltage/wattage engineer. He always said, `an engineer can make an error, but only once'. Luckily, we can make many errors :) -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.googl

Re: "Tactical" /24 announcements

2021-08-13 Thread Amir Herzberg
some number, but this seems necessary (to me). -- Amir Herzberg Comcast professor of Security Innovations, Computer Science and Engineering, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home `Applied Introduction to Cryptography' textbook and lectures:

Re: "Tactical" /24 announcements

2021-08-13 Thread Amir Herzberg
On Fri, Aug 13, 2021 at 12:50 PM Baldur Norddahl wrote: > > On Fri, Aug 13, 2021 at 3:54 AM Amir Herzberg > wrote: > >> On Thu, Aug 12, 2021 at 4:32 PM Baldur Norddahl < >> baldur.nordd...@gmail.com> wrote: >> >>> >>> >>> On Thu,

Re: "Tactical" /24 announcements

2021-08-12 Thread Amir Herzberg
On Thu, Aug 12, 2021 at 4:32 PM Baldur Norddahl wrote: > > > On Thu, Aug 12, 2021 at 7:39 PM Amir Herzberg > wrote: > >> Bill, I beg to respectfully differ, knowing that I'm just a researcher >> and working `for real' like you guys, so pls take no offence.

Re: "Tactical" /24 announcements

2021-08-12 Thread Amir Herzberg
On Thu, Aug 12, 2021 at 1:22 PM William Herrin wrote: > On Thu, Aug 12, 2021 at 9:41 AM Hank Nussbacher > wrote: > > On 12/08/2021 17:59, William Herrin wrote: > > > If you prune the routes from the Routing Information Base instead, for > > > any widely accepted size (i.e. /24 or shorter netmask

Re: "Tactical" /24 announcements

2021-08-12 Thread Amir Herzberg
On Thu, Aug 12, 2021 at 12:43 PM Hank Nussbacher wrote: > On 12/08/2021 17:59, William Herrin wrote: > > > If you prune the routes from the Routing Information Base instead, for > > any widely accepted size (i.e. /24 or shorter netmask) you break the > > Internet. > > How does this break the Inte

Re: "Tactical" /24 announcements

2021-08-09 Thread Amir Herzberg
khole subprefix traffic rather than send it on a route which would be hijacked (i.e., if the route is to a neighbor AS that announced legit prefix _and_ hijacked subprefix). Simple. [and no, I'm not happy with the resulting disconnections. but it's better than hijack imho] best, Amir --

Re: ROV++: Improved Deployable Defense against BGP Hijacking

2021-01-09 Thread Amir Herzberg
like Job Snijders or Cecilia Testart could have provided you an > up-to-date list of ASes that currently deploy ROV. It is not clear to me > why it is useful to look at scenarios in which those networks potentially > no longer deploy ROV. > Excellent point, this may indeed be a mo

Re: ROV++: Improved Deployable Defense against BGP Hijacking

2020-12-09 Thread Amir Herzberg
s I normally do; btw part of it is for giving tutorial on PKI and participating in the CANS conference, if anybody interested, it's free ; not that I understand why I agreed to do it :) Cheers, Amir -- Amir Herzberg Comcast professor of Security Innovations, University of Connecti

ROV++: Improved Deployable Defense against BGP Hijacking

2020-12-09 Thread Amir Herzberg
or by direct email to me, is welcome, thanks. btw, I keep most publications there (researchgate), incl. the drafts of `foundations of cybersecurity' ; the 1st part (mostly applied crypto) is in pretty advanced stage, feedback is also very welcome. URL in sig. -- Amir Herzberg Comcast pr

Re: "Is BGP safe yet?" test

2020-04-20 Thread Amir Herzberg
he attack may be much reduced when the attacker has to prepend. Note also that if one combines ASPA, the protection would be even better. The simulation results in our SIGCOMM'2016 give some idea of these benefits (imprecise, of course). I _think_ Randy will agree; but then again, Randy love

Re: backtracking forged packets?

2020-03-15 Thread Amir Herzberg
ddresses which have been spoofed. If the attacker > was hitting random ports on those hosts, I'd expect to see some RSTs. > yes, but I bet attacker is not hitting random ports, attacker is hitting real servers in TCP listen. (sorry don't have time to netflow... have tons of work

Re: backtracking forged packets?

2020-03-15 Thread Amir Herzberg
it may take me quite a while to make this (2nd) part useable. -- Amir Herzberg Comcast professor of Security Innovations, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home Foundations of Cyber-Security (part I: applied crypto, part II: network-s

Re: a bit off-topic: ManTra'20 CFP

2020-03-08 Thread Amir Herzberg
see some familiar (academic, mostly) names in the PC. There is not much time until the submission deadline of April 10. URL: https://conferences.sigcomm.org/sigcomm/2020/workshop-mantra.html Cheers, Amir Herzberg Comcast professor of Security Innovations, University of Connecticut Homepage

Re: TCP-AMP DDoS Attack - Fake abuse reports problem

2020-02-21 Thread Amir Herzberg
your IP range (assuming the victim isn't some service that your clients will want to access). If all fails then all failed. -- Amir Herzberg Comcast professor of Security Innovations, University of Connecticut Homepage: https://sites.google.com/site/amirherzberg/home Foundations of

Re: TCP-AMP DDoS Attack - Fake abuse reports problem

2020-02-20 Thread Amir Herzberg
valid reason to consider you either as the attacker or as an (unknowning, perhaps) accomplice. I may be wrong - sorry if so - and would appreciate, in any case, if you can confirm or clarify, thanks. -- Amir Herzberg Comcast professor of Security Innovations, University of Connecticut Home

Re: Why are IPsec SAs unidirectional

2020-02-16 Thread Amir Herzberg
Bart asked, > Does someone know why these IPsec SAs are unidirectional? Usually the > RFC describes some reasoning behind certain design decisions. However, I > can't seem to find a justification other than "It's by design". On the > Internet however, I read that the two SA requirement is chosen f

Re: Dual Homed BGP

2020-01-27 Thread Amir Herzberg
Dear Job and NANOG, Just wondering, wouldn't any of you guys consider using full tables in this case, for the ability to detect and avoid prefix hijacks (using RPKI/ROV or other means)? Of course, I'm focused on security, and I know this is often not a high priority for a real network manager wh

Re: Data on latency and loss-rates during congestion DDoS attacks

2020-01-26 Thread Amir Herzberg
I have no idea who was the reviewer (academic or industry or whatever). However, he didn't actually object to the assertion that latency increases with congestion; he only raised the question of the which latency values would be typical/reasonable for a congestion DoS attack. Notice also that the r

Re: Data on latency and loss-rates during congestion DDoS attacks

2020-01-25 Thread Amir Herzberg
t;. It would be great if forward > error correction could have improved that experience. > > Damian > > On Fri, Jan 24, 2020 at 7:27 PM Amir Herzberg > wrote: > >> Damian, thanks! >> >> That's actually roughly the range of losses we focused on; but

Re: Data on latency and loss-rates during congestion DDoS attacks

2020-01-25 Thread Amir Herzberg
On Sat, Jan 25, 2020 at 2:12 AM Saku Ytti wrote: > On Sat, 25 Jan 2020 at 05:30, Amir Herzberg wrote: > > DDoS is very very cheap, if there is a single global egress for given > interface then the DDoS traffic can easily be 100 times the egress > capacity (1GE egress, 100GE

Re: Data on latency and loss-rates during congestion DDoS attacks

2020-01-24 Thread Amir Herzberg
sses at 50% or more are not uncommon. > > Damian > > On Fri, Jan 24, 2020 at 4:41 AM Amir Herzberg > wrote: > >> Dear NANOG, >> >> One of my ongoing research works is about a transport protocol that >> ensures (critical) communication in spite of DDoS congesti

Data on latency and loss-rates during congestion DDoS attacks

2020-01-24 Thread Amir Herzberg
right parameters. Any chance you have such data and can share? Many thanks! -- Amir Herzberg Comcast chair of security innovation, University of Connecticut Foundations of cybersecurity <https://www.researchgate.net/publication/323243320_Introduction_

Re: Reflection DDoS last week (was: syn flood attacks from NL-based netblocks)

2019-08-21 Thread Amir Herzberg
Töma, thanks for this interesting update. The best defense against this type of DDoS attacks seems idd to be relaying to sufficiently-large-bandwidth cloud/CDN, and filtering TCP traffic (received not from the relay). Such relaying should be done well - smart attacks may still be possible for `naiv

Re: syn flood attacks from NL-based netblocks

2019-08-18 Thread Amir Herzberg
s, but that goal has proved quite difficult... -- Amir Herzberg Comcast professor for security innovation Dept. of Computer Science and Engineering, University of Connecticut On Sat, Aug 17, 2019 at 11:03 PM Mike wrote: > On 8/16/19 3:04 PM, Jim Shankland wrote: > > Greetings, > >

Re: syn flood attacks from NL-based netblocks

2019-08-17 Thread Amir Herzberg
ation to a nice paper exploring this issue. BR... -- Amir Herzberg Comcast professor for security innovation Dept. of Computer Science and Engineering, University of Connecticut On Sat, Aug 17, 2019 at 6:56 PM Damian Menscher wrote: > On Sat, Aug 17, 2019 at 3:36 PM Amir Herzberg > wrote: &

Re: syn flood attacks from NL-based netblocks

2019-08-17 Thread Amir Herzberg
Hmm, I doubt this is the output of TCP amplification since Jim reported it as SYN spoofing, i.e., SYN packets, not SYN-ACK packets (as for typical TCP amplification). Unless the given _hosts_ respond with multiple SYN-ACKs in which case these may be experiments by an attacker to measure if these IP

Re: BGP prefix filter list

2019-05-18 Thread Amir Herzberg
ch - we showed how this happens with ROV in our NDSS paper on it: https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/are-we-there-yet-rpkis-deployment-and-security/ Amir Herzberg Comcast professor for security innovation Dept. of Computer Science and Engineering, University of Connect

IEEE CNS (co-located w/ NANOG) and lectures/notes on cyber-sec, routing

2019-04-28 Thread Amir Herzberg
cises (a fair number and quite challenging). But lectures (pptx) are already available on most topics, incl. routing security. Hope some of you may find these of some use; feedback welcome (probably by private mail would be better). Best, Amir -- Amir Herzberg Comcast professor for security

Process for deploying new BGP attributes (experimentally or otherwise)

2019-01-27 Thread Amir Herzberg
o some non-conforming networks. - Is there an agreed-upon list of the forums and mailing lists on which one should warn in advance about such planned announcements, and the details that should be included? Thanks, Amir -- Amir Herzberg Comcast professor for security innovation Dept. of Computer S