On Thu, 2003-11-27 at 17:48, IndianZ wrote:
Does anybody know more about MPLS Vulnerabilities and what to/how to pentest in a MPLS architecture? Any input about tools, hints and tricks is
welcome...
You may find this useful : http://www.securite.org/presentations/ripe46/COLT-RIPE46-NF-MPLS-TrafficShunt-v1.pdf
This presentation is actually about MPLS-based traffic diversion :)
MPLS security is discussed here (slides 46+): [PPT] http://www.securite.org/presentations/secip/BHUS-IPBackboneSecurity.ppt [PDF] http://www.securite.org/presentations/secip/BHUS-IPBackboneSecurity.zip
Also, have a look at Michael's I-Ds on MPLS Security (local copies): http://www.securite.org/nico/XP/draft-behringer-mpls-security-05.txt http://www.securite.org/nico/XP/draft-behringer-mpls-vpn-auth-03.txt
Nico. -- Nicolas FISCHBACH ([EMAIL PROTECTED]) <http://www.securite.org/nico/> Senior Manager - IP Engineering/Security - COLT Telecom Securite.Org Team <http://www.securite.org/>
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
