this is may be their research summary & assumption. "Our only assumption is that we have* full control over a single OSPF router *. From there, we have to cause maximum damage to the AS. Therefore, overcoming OSPF Authentication Protection is trivial, since* the authentication key is known* to us."
http://www.google.lk/url?sa=t&source=web&cd=4&ved=0CC8QFjAD&url=http%3A%2F%2Fwebcourse.cs.technion.ac.il%2F236349%2FSpring2011%2Fho%2FWCFiles%2F2009-2-ospf-presentation.pptx&ei=nRk8TqTcIcPjrAf12JQY&usg=AFQjCNGOeWzSyFV-RdjdgFq5J4QDBAGnTQ On Fri, Aug 5, 2011 at 10:00 PM, arulgobinath emmanuel <[email protected]>wrote: > anybody actually know what is this presentation about ?? or is it the same > well known attack ? > > > http://www.blackhat.com/html/bh-us-11/bh-us-11-briefings.html#Nakibly > > http://www.networkworld.com/news/2011/080411-blackhat-ospf-vulnerability.html > > thanks, > Gobinath. > _______________________________________________ cisco-nsp mailing list [email protected] https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
