Comment by bandrami

19 days ago

The ISP is the primary threat vector here (do you trust yours? Along with their contractors and anyone who might have compromised them?). But like I said route-poisoning attacks do exist.

yeah but the likelihood of this is incredibly remote. It would shock me if ISPs didn't have alarms going off if RFC1918 space was suddenly routable within their BGP table.

Not to mention the return packet would be NAT'd so the attacker would have to deal with that complication.

  • The return packet wouldn't be NATed, because stateful NAT tracks connections and only applies NAT to packets that belong to outbound connections.

    Arguing over how likely this is is missing the point. If it can happen at all when you're running NAT, then it should be clear that NAT isn't providing security.

    • “if it protects 99.999% of attackers from reaching you but not this one specific attacker in this one case of misconfiguration, it’s not providing security”…

      Dude, that’s a really shitty take and this is why people that do care about security end up ignoring advice from anyone who thinks this way.

      You’re in the camp of “don’t use condoms because they can break”.

      7 replies →

Yes, I trust everyone who works at it, mostly because I know where they live.

  • Do you trust the state actors who have compromised it?

    • Or more likely, network engineers who’ve been subpoenaed to collect the information?

      Your scenario is plausible for high value targets. Like, what country wouldn’t want to have a friendly tech working at the ISP most politicians use in DC? That doesn’t seem improbable.

      For the regular Joe Schmoe, I’d be more concerned with court-ordered monitoring.

      2 replies →