this post was submitted on 07 May 2024
119 points (95.4% liked)

Technology

60090 readers
2829 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
 

Good summary by another user in the crosspost over in [email protected]:

https://lemmy.ca/post/20720943

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 20 points 7 months ago (1 children)

Pretty rough and clever. Probably used in espionage for some time now. Sounds like static addresses and network namespaces solves for most of the problem though.

[–] [email protected] 8 points 7 months ago* (last edited 7 months ago) (1 children)

Yeah. Easy to check and get around this. Check your routes before transmitting data, also set up your VPN to push /2s if this relies on /1s, nuke extra routes, etc.

Novel idea though that most people wouldn’t think to look for, but at the end of the day any system will follow its routing table.

[–] [email protected] 8 points 7 months ago

also set up your VPN to push /2s if this relies on /1s,

I don't think this is a smart way to mitigate this because it could easily result in an arms race. Push /2s, the attacker will switch to /3s; push /4s, the attacker will switch to /5s, etc. Every +1 is going to require doubling the number of routing table entries.

That can't continue forever, obviously, but it's going to result in a negative experience for the user if the VPN client has to push hundreds or thousands of routes to mitigate this attack.