TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Millions of the Pentagon’s dormant IP addresses sprang to life on January 20

578 点作者 jimschley大约 4 年前

21 条评论

dang大约 4 年前
Related: <a href="https:&#x2F;&#x2F;www.kentik.com&#x2F;blog&#x2F;the-mystery-of-as8003&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.kentik.com&#x2F;blog&#x2F;the-mystery-of-as8003&#x2F;</a><p>(via <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26924988" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26924988</a>, but no comments there to speak of)
jvdvegt大约 4 年前
Paywall-free link: <a href="https:&#x2F;&#x2F;archive.is&#x2F;tKOOA" rel="nofollow">https:&#x2F;&#x2F;archive.is&#x2F;tKOOA</a>
评论 #26925941 未加载
WarOnPrivacy大约 4 年前
TampaBay times has a more detailed article w&#x2F; some details from netsec researchers. They&#x27;re indicating a well-known spammer is behind the company.<p><a href="https:&#x2F;&#x2F;www.tampabay.com&#x2F;news&#x2F;military&#x2F;2021&#x2F;04&#x2F;24&#x2F;pentagon-mystery-with-a-florida-connection-is-solved-sort-of&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.tampabay.com&#x2F;news&#x2F;military&#x2F;2021&#x2F;04&#x2F;24&#x2F;pentagon-m...</a><p>This Sunbiz record has company principals and filings from 2007-2013 - inc names (not in TBT article) and another dropbox address, this one in Chicago<p><a href="http:&#x2F;&#x2F;search.sunbiz.org&#x2F;Inquiry&#x2F;corporationsearch&#x2F;SearchResultDetail?inquirytype=EntityName&amp;directionType=PreviousList&amp;searchNameOrder=GLOBALRESOURCESYSTEMS%20M060000016990&amp;aggregateId=forl-m06000001699-a8147ffb-e7b4-41e1-a981-2bd8900de732&amp;searchTerm=GLOBAL%20RIFLEX%20SOLUTIONS%20CORP&amp;listNameOrder=GLOBALRESOURCESUSA%20V130771" rel="nofollow">http:&#x2F;&#x2F;search.sunbiz.org&#x2F;Inquiry&#x2F;corporationsearch&#x2F;SearchRes...</a><p>That Chicago dropbox address is currently shared by:<p>This intellectual property law firm <a href="https:&#x2F;&#x2F;www.greengriffith.com&#x2F;contact&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.greengriffith.com&#x2F;contact&#x2F;</a><p>This venture capital firm <a href="http:&#x2F;&#x2F;www.lakecapital.com&#x2F;contact_location.asp" rel="nofollow">http:&#x2F;&#x2F;www.lakecapital.com&#x2F;contact_location.asp</a><p>This management company adds another name and address and is tied to the FL addresses <a href="https:&#x2F;&#x2F;floridadb.com&#x2F;company&#x2F;M06000002257&#x2F;filinet-llc" rel="nofollow">https:&#x2F;&#x2F;floridadb.com&#x2F;company&#x2F;M06000002257&#x2F;filinet-llc</a><p>.<p>OpenCorpWiki has an additional dropbox addy down the street<p><a href="https:&#x2F;&#x2F;opencorporates.com&#x2F;companies&#x2F;us_fl&#x2F;M20000009226" rel="nofollow">https:&#x2F;&#x2F;opencorporates.com&#x2F;companies&#x2F;us_fl&#x2F;M20000009226</a><p>note: The BBB listing confirms reconciles FL address w&#x2F; the domain <a href="https:&#x2F;&#x2F;opencorporates.com&#x2F;companies&#x2F;us_fl&#x2F;M20000009226" rel="nofollow">https:&#x2F;&#x2F;opencorporates.com&#x2F;companies&#x2F;us_fl&#x2F;M20000009226</a><p>This mailing list has been following the same trail I have <a href="https:&#x2F;&#x2F;www.mail-archive.com&#x2F;nanog@nanog.org&#x2F;msg112229.html" rel="nofollow">https:&#x2F;&#x2F;www.mail-archive.com&#x2F;nanog@nanog.org&#x2F;msg112229.html</a>
评论 #26932977 未加载
评论 #26933722 未加载
pgn674大约 4 年前
&quot;several Chinese companies use network numbering systems that resemble the U.S. military’s IP addresses in their internal systems&quot;<p>I don&#x27;t think I&#x27;ve heard of this before. What does it mean? Does China operate a disconnected BGP network? Or do they have some modified protocol, or what?
评论 #26927455 未加载
评论 #26925724 未加载
评论 #26926052 未加载
评论 #26925922 未加载
评论 #26926922 未加载
评论 #26925785 未加载
评论 #26925944 未加载
coderholic大约 4 年前
Some details about the ASN announcing the DoD prefixes: <a href="https:&#x2F;&#x2F;ipinfo.io&#x2F;AS8003" rel="nofollow">https:&#x2F;&#x2F;ipinfo.io&#x2F;AS8003</a><p>It looks like they&#x27;re not just announcing 11.0.0.0&#x2F;8 but also a bunch of more specific routes, including 11.0.0.0&#x2F;13 and 11.0.0.0&#x2F;24<p>It looks like currently their only peer is Hurricane Electric: <a href="https:&#x2F;&#x2F;ipinfo.io&#x2F;AS6939" rel="nofollow">https:&#x2F;&#x2F;ipinfo.io&#x2F;AS6939</a>
评论 #26928103 未加载
yftsui大约 4 年前
Previous story in 2015: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10006534" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10006534</a> . This article is exaggerating by saying it happened overnight, which started actually 5 years ago.
评论 #26927180 未加载
评论 #26929823 未加载
评论 #26927200 未加载
j3th9n大约 4 年前
My theory: apparently a lot of companies use the IP-addresses internally. And apparently the intention was to sell the IP-addresses already for a long time. But buyers would be faced with a lot of traffic coming from all those companies using the ranges internally, instant DDoS. Maybe this is an attempt to &quot;clean&quot; the IP-addresses before selling them. It will probably only take time before most companies using the ranges internally and having problems now (or happily continuing business now with the help of Pentagon servers), to reconfigure their networks to fix it. In the meantime the Pentagon can probably collect some interesting traffic, speeding up the whole process of reconfiguration by companies who use the ranges, to prevent their secrets from falling into exactly the right hands.
评论 #26931532 未加载
tiernano大约 4 年前
when digging though some of the IPs, i came across 22.0.0.0&#x2F;8, which if you look at the DNS tab of bgp.he.net (<a href="https:&#x2F;&#x2F;bgp.he.net&#x2F;net&#x2F;22.0.0.0&#x2F;8#_dns" rel="nofollow">https:&#x2F;&#x2F;bgp.he.net&#x2F;net&#x2F;22.0.0.0&#x2F;8#_dns</a>) shows a LOT of people are &quot;using&quot; those IPs... which means a LOT of people wont be happy that their sites, email, dns, etc, are now essentially being blackholed... for me (I run AS204994), the traffic hits Frankfurt (i peer with HE there) goes over their network though Paris, then to Ashburn and then is blackholed... gone after that... wondering how much traffic is being seen by he.net with this...
评论 #26928607 未加载
tyingq大约 4 年前
Still seems a bit odd to me. It doesn&#x27;t explain why &quot;GLOBAL RESOURCE SYSTEMS, LLC&quot; is involved. Poking around, the individuals associated with that aren&#x27;t government employees. The company was formed 9&#x2F;8&#x2F;2020 in Delaware.
评论 #26926081 未加载
评论 #26927036 未加载
评论 #26926040 未加载
评论 #26926203 未加载
评论 #26926228 未加载
LogicX大约 4 年前
Related: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26924988" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26924988</a>
cjhanks大约 4 年前
Hopefully not too off topic. How do people monitor these BGP announcements? Is it possible for laymen to monitor such route rules?
评论 #26930209 未加载
dr_dshiv大约 4 年前
&quot;large amounts of data could provide several benefits for those in a position to collect and analyze it for threat intelligence and other purposes&quot;
评论 #26927396 未加载
gumby大约 4 年前
This is a complete side point, but what does this sentence mean?<p>&gt; Created in 2015, the DDS operates a Silicon Valley-like office within the Pentagon.
评论 #26926360 未加载
评论 #26927566 未加载
评论 #26926323 未加载
评论 #26926453 未加载
评论 #26926341 未加载
jeffrallen大约 4 年前
Two words: network telescope. See CAIDA&#x27;s papers on their network telescope.
throwaway2474大约 4 年前
Can someone explain how we know these “announcements” are real? What’s to stop me setting up a company and announcing random dormant address ranges that I don’t own?
评论 #26929036 未加载
peter_retief大约 4 年前
When is everyone going to start using IPv6? If ever? I have tried but find that so many ISP&#x27;s actually block IPv6 traffic.
djoldman大约 4 年前
<a href="https:&#x2F;&#x2F;outline.com&#x2F;3HuXPj" rel="nofollow">https:&#x2F;&#x2F;outline.com&#x2F;3HuXPj</a>
client4大约 4 年前
T-mobile does the same thing.
drawkbox大约 4 年前
&gt; <i>Defense Digital Service (DDS) authorized a pilot effort advertising DoD Internet Protocol (IP) space using Border Gateway Protocol (BGP). This pilot will assess, evaluate and prevent unauthorized use of DoD IP address space. Additionally, this pilot may identify potential vulnerabilities. This is one of DoD’s many efforts focused on continually improving our cyber posture and defense in response to advanced persistent threats. We are partnering throughout DoD to ensure potential vulnerabilities are mitigated.</i><p>Interesting, seems an effort to find out who was abusing ranges that were exclusively allowed or disallowed based on the ranges. Malware that tries to look like something else that uses a state level IP range to evade blocking, or check for blocks.[1]<p>&gt;<i>I interpret this to mean that the objectives of this effort are twofold. First, to announce this address space to scare off any would-be squatters, and secondly, to collect a massive amount of background internet traffic for threat intelligence.</i><p>&gt;<i>On the first point, there is a vast world of fraudulent BGP routing out there. As I’ve documented over the years, various types of bad actors use unrouted address space to bypass blocklists in order to send spam and other types of malicious traffic.</i><p>Cloudflare example shows how much traffic some of these ranges that are included&#x2F;excluded have when turned on.<p>&gt;<i>On the second, there is a lot of background noise that can be scooped up when announcing large ranges of IPv4 address space. A recent example is Cloudflare’s announcement of 1.1.1.0&#x2F;24 and 1.0.0.0&#x2F;24 in 2018.</i><p>&gt;<i>For decades, internet routing operated with a widespread assumption that ASes didn’t route these prefixes on the internet (perhaps because they were canonical examples from networking textbooks). According to their blog post soon after the launch, Cloudflare received “~10Gbps of unsolicited background traffic” on their interfaces.</i><p>&gt;<i>And that was just for 512 IPv4 addresses! Of course, those addresses were very special, but it stands to reason that 175 million IPv4 addresses will attract orders of magnitude more traffic. More misconfigured devices and networks that mistakenly assumed that all of this DoD address space would never see the light of day.</i><p>Looks like a new cybersecurity policy&#x2F;process started on inauguration day. Probably a defensive or offensive measure to combat the supply chain attacks that may well have used those ranges in evading blocking.<p>Why use a front company? As a honeypot.<p>If other scammers are using spoofing the ranges then another company does it, that doesn&#x27;t raise alarm in the other entities abusing the same trick. If you announce it as DoD then it may scare off the others.<p>In any good investigation, you want to shroud the data&#x2F;intel collection. Using a front company, or series of levels of fronts, is the way you have to go about it.<p>[1] <a href="https:&#x2F;&#x2F;www.kentik.com&#x2F;blog&#x2F;the-mystery-of-as8003&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.kentik.com&#x2F;blog&#x2F;the-mystery-of-as8003&#x2F;</a>
cbar_tx大约 4 年前
are we really pretending this isn&#x27;t just the mass surveillance machine roaring back to life?
评论 #26966611 未加载
ThothIV大约 4 年前
Also adding 255.0&#x2F;8 and 255&#x2F;4 which is essentially just... IPV6. So we&#x27;re finally going ipv6, I guess!
评论 #26934017 未加载