{"id":11773,"date":"2013-11-21T09:42:12","date_gmt":"2013-11-21T15:42:12","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=11773"},"modified":"2013-11-21T09:42:12","modified_gmt":"2013-11-21T15:42:12","slug":"targeted-internet-traffic-misdirection","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=11773","title":{"rendered":"Targeted Internet Traffic Misdirection"},"content":{"rendered":"<blockquote><p>In practical terms, this means that Man-In-the-Middle BGP route hijacking has now moved from a theoretical concern to something that happens fairly regularly, and the potential for traffic interception is very real. Everyone on the Internet \u2014 certainly the largest global carriers, certainly any bank or credit card processing company or government agency \u2014 should now be monitoring the global routing of their advertised IP prefixes.<\/p>\n<p>This kind of attack should not happen. You cannot carry out this kind of hijacking without leaving permanent, visible footprints in global routing that point right back to the point of interception. We believe that people are still attempting this because they believe (correctly, in most cases) that nobody is looking.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.renesys.com\/2013\/11\/mitm-internet-hijacking\/\">The New Threat: Targeted Internet Traffic Misdirection &#8211; Renesys<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In practical terms, this means that Man-In-the-Middle BGP route hijacking has now moved from a theoretical concern to something that happens fairly regularly, and the potential for traffic interception is very real. Everyone on the Internet \u2014 certainly the largest &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=11773\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[601,340,698],"class_list":["post-11773","post","type-post","status-publish","format-standard","hentry","category-networking","tag-bgp","tag-mitm","tag-security-research"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/11773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11773"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/11773\/revisions"}],"predecessor-version":[{"id":11774,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/11773\/revisions\/11774"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11773"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}