Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Blue_Tires

(55,445 posts)
Mon Mar 16, 2015, 06:53 PM Mar 2015

A network error routed traffic for the UK's nuclear weapons agency through Russian telecom

For the past week, something strange has been going on in the European internet. For five days, web traffic from Texas to certain addresses in the UK has been routed through Ukrainian and Russian telecoms, taking a detour thousands of miles out of the way. Network traffic often takes a circuitous route as a result of network congestion or interconnection difficulties, but neither one would be enough to account for these routes. Instead, this was the result of a bad route announced by Ukraine's Vega telecom, inserting itself in between. "At this point, I have to believe this was an innocent mistake by Vega," said Dyn's Doug Madory, who first discovered the redirection, "but it's concerning nonetheless."

This phenomenon is known as "route hijacking," and it's a common security concern for network engineers and security researchers alike. It's particularly disconcerting because of the sensitive nature of many of the sites involved. Among the dozens of sites involved was the UK's Atomic Weapons Establishment, which is tasked with managing and delivering the UK's nuclear warheads, as well as the UK's official mail service, the Royal Mail. US defense contractor Lockheed Martin was also running a VPN connection that was caught up in the redirection.

VPN traffic would have been encrypted, as well as almost all email traffic, but anyone listening in on email traffic would have been able to read the IP addresses of the parties involved. Even worse, any site serving data over unencrypted HTTP would have been entirely in the clear, and potentially exposed to injection attacks by a malicious third party with access to an intermediate network. (Both AWE and Royal Mail serve their sites over unencrypted HTTP.) Because of the public nature of the routing table, it's easy to see exactly when and how the route hijacking occurred, but why is still a mystery, and we can't say for sure whether any data was altered in transit.

It's still likely that the redirection was simply an innocent error, but it underscores the insecure nature of the global routing system. While much of the web has grown more wary of digital attack, routing is still based on trust, with networks freely announcing routes and friendly telecoms adopting them as a matter of habit. As a result, inefficient and potentially insecure routes like this one can linger for days without being corrected, without the parties involved ever being aware of them.

http://www.theverge.com/2015/3/13/8208413/uk-nuclear-weapons-russia-traffic-redirect

2 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
A network error routed traffic for the UK's nuclear weapons agency through Russian telecom (Original Post) Blue_Tires Mar 2015 OP
Obviously the work of Edward Snowden. OnyxCollie Mar 2015 #1
Pray tell, IDemo Mar 2015 #2
 

OnyxCollie

(9,958 posts)
1. Obviously the work of Edward Snowden.
Mon Mar 16, 2015, 09:47 PM
Mar 2015

Or is it Ralph Nader?

Maybe they're the SAME PERSON! Have you ever seen them in the same room together? No? It's proof, I tell you!

IDemo

(16,926 posts)
2. Pray tell,
Mon Mar 16, 2015, 10:16 PM
Mar 2015

WTF has anything with 'Atomic Weapons Establishment' in its name connected in any fashion to the intertubes?

Latest Discussions»Issue Forums»Editorials & Other Articles»A network error routed tr...