Remove Advertising Remove DNS Remove Routers
article thumbnail

News in Networking: Russian Internet for North Korea, Google Finds DNS Vulnerabilities

Kentik

And Google disclosed seven vulnerabilities in DNS’ Dnsmasq software. Yet More DNS and DHCP Vulnerabilities (Google Blog). Most Companies Are Unprepared for DNS Attacks (HelpNetSecurity). Russia also made headlines for its covert efforts to steal secrets from the NSA.

DNS 40
article thumbnail

BGP and RPKI: A Path Made Clear with Kentik

Kentik

It is the language spoken by routers to determine how packets can be sent from one router to another to reach their final destination. In this case it was due to more specific prefixes that should not have been advertised. One way to think about it is that RPKI is to BGP what DNSSEC is to DNS. It’s called RPKI.

Routers 58
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Kentik Takes a Leap Forward in DDoS Defense

Kentik

A common DDoS mitigation technique is Remotely-Triggered Black Hole (RTBH), which requires extensive pre-configuration of discard routes and/or uRPF on all edge routers. The victim can update DNS to point at a different IP address in an attempt to get their application back up. The mitigation actually “completes the attack.”

article thumbnail

The Future of DDoS Protection in an IoT World

Kentik

As an example of what can happen, the Mirai malware set loose in late 2016 created a botnet of IoT devices that included ordinary consumer devices such as security cameras, routers, and other home use IoT devices purposely designed to take websites and entire networks offline. The scale of the initial Mirai-based attack was eye-opening.

IoT 40
article thumbnail

A Brief History of the Internet’s Biggest BGP Incidents

Kentik

Disruptions and attacks caused by BGP incidents In BGP parlance, the term “routing leak” broadly refers to a routing incident in which one or more BGP advertisements are propagated between ASes in a way they were not intended to. Two competing methodologies, RPSL and RPKI, are used to inform the defensive configuration of routers.