[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] MPLS Security
- To: full-disclosure@lists.netsys.com
- Subject: Re: [Full-Disclosure] MPLS Security
- From: Nicolas FISCHBACH <nicolist@securite.org>
- Date: Tue, 02 Dec 2003 10:27:35 +0100
Nicob wrote:
On Thu, 2003-11-27 at 17:48, IndianZ wrote:
Does anybody know more about MPLS Vulnerabilities and what to/how to
pentest in a MPLS architecture? Any input about tools, hints and tricks is
welcome...
You may find this useful :
http://www.securite.org/presentations/ripe46/COLT-RIPE46-NF-MPLS-TrafficShunt-v1.pdf
This presentation is actually about MPLS-based traffic diversion :)
MPLS security is discussed here (slides 46+):
[PPT] http://www.securite.org/presentations/secip/BHUS-IPBackboneSecurity.ppt
[PDF] http://www.securite.org/presentations/secip/BHUS-IPBackboneSecurity.zip
Also, have a look at Michael's I-Ds on MPLS Security (local copies):
http://www.securite.org/nico/XP/draft-behringer-mpls-security-05.txt
http://www.securite.org/nico/XP/draft-behringer-mpls-vpn-auth-03.txt
Nico.
--
Nicolas FISCHBACH (nico@securite.org) <http://www.securite.org/nico/>
Senior Manager - IP Engineering/Security - COLT Telecom
Securite.Org Team <http://www.securite.org/>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html