Security: YouTube Hijacking

It’s an issue of the Internet infrastructure well known since at least the 1990s – data / packets can be rerouted to more or less any IP address via the Border Gateway Protocol (BGP, RFC 4271).

BGP is normally used to announce between routers which networks are reachable by which (preferred) routes. And on the Internet all routers trust each other and there are no mechanisms built into the protocol to assure that the counterpart in a communication “does not lie“.

The issue, as said, is not new and known at least to insiders (security expert Peiter C. Zatko aka Mudge claimed 1998 during a Senate hearing that he could bring down the whole Internet in 30 minutes via BGP) but with I-Net 9/11 plans and recent geo-political DDoS attacks the discussion seems to have been revived during the last days.

Below a link to an event analysis animation / video by RIPE of the YouTube blackout earlier this year when Pakistani Telecom used BGP to announce a new route to the YouTube servers (a Null device in Pakistan).

Click on the image below for the link

link to RIPE web site / video

More information:
YouTube Hijacking: A RIPE NCC RIS case study

Related Posts:

  1. Bittorrent: Now embedded in network and consumer electronics
  2. Today Bittorrent announced that its popular file sharing software will be embedded into network routers and Internet devices. BitTorrent enabled network devices will allow users to connect to the Internet, schedule and download files without the need to use a PC. ASUS, Planex and QNAP are the first to announce plans to embed BitTorrent’s download [...]

  3. i-Patriot, Censorship, Internet 2 and the day the routers died
  4. link to article
    Last week again saw strong discussions on the changes happening on the Internet, this time fueled by an video where Lawrence Lessig provided insides on an potential i-Patriot Act ante portas – similar to the 9/11 crashing of civil rights. Watch the “video” or read “the highlights” of it – the points raised make a lot of sense in the context of the changes seen the last 12/24 months.

    When listening to the discussions it reminded us of the song “The day the routers died” from the RIPE 55 conference. While definitely not intended to be political in the context of an i-Patriot act it gets a completely new twist (particularly some of the verses)…

    Continue reading…

  5. Security: The weakest link
  6. link to article
    We have been asked a few times for an example to better understand that the security of a system is defined by its weakest link. Well here’s one of our example video for that…

    Continue reading…

  7. Advertising: From YouTube to mainstream
  8. link to article
    Is this the next step in consumer-generated advertising?

    A television commercial for the new iPod Touch from Apple, running since last weekend in the US and created by Apple’s advertising agency TBWA/Chiat/Day, is based on a mock-up commercial that 18-year-old Nick Haley from Warwick, England, created on his computer in one day last month.

    It might be significant because it is perhaps the first concrete example of an amateur flick being implemented and used by professionals in that way

    continue reading…

Comments Off

Comments are closed.