I work for one of the top US ISPs, and can assure you we have it on our docket to look into this around 2060, and implement around 3487.
@XDarkGreyXАй бұрын
Glad to hear. Thank you for your services.
@riodweberАй бұрын
Those are Jira ticket numbers right???? ... Right?
@TemplePate01Ай бұрын
@@riodweber Lol! Jokes aside this is on our docket but I'll be honest, this is only the 2nd communication company I've worked for, but both has one critical issue. Lack of communication. I wouldn't be surprised if we don't see any progress from us for many many years
@johndoe6189Ай бұрын
@@TemplePate01 lol
@arakwarАй бұрын
Eh, first time I see such early estimates. They usually just don't bother estimating anything that would be deployed by their grand-children.
@Julian-vi4vlАй бұрын
Normaly the more you learn about something the less magical it seems to become, with BGP you start to wonder more and more how it survived this long.
@valltzuАй бұрын
Well, there's no other routing protocol that can handle the scale of the Internet as BGP can. Most people take "Internet" for granted, but it's basically a universe and we have just managed to make it work somehow.
@thespexks2565Ай бұрын
@@valltzuI wouldn’t say we “managed to make it work somehow”. The internet and networking as a whole is fundamentally built upon the aspects of interopribily, if everyone isn’t on the same page on how to talk to each other, you can’t talk to each other. Because of this tons of research and work has to go into these protocols to make them as bullet proof as can be
@PrebleStreetRecordsАй бұрын
That’s how I feel all the time working with infrastructure. It’s a giant house of cards.
@sam3317Ай бұрын
you're not supposed to look behind the curtain, you fool. That's how the magic werks, just don't look. Next thing you'll be questioning where the value of fiat currency comes from. At that point the house of cards just collapses.
@sam3317Ай бұрын
@@thespexks2565 "interopribily" if we want things to keep working, it's vital that we don't make silly little mistakes because we're desperate to press the reply button before we've properly checked our spelling.
@vatsxn511Ай бұрын
I am a Network Engineer and work with BGP almost everyday and its always a mess when someone does a minor config mistake or if there is a route leak. But I hate to admit it, there's not a better standardised protocol that can replace BGP.
@akshaysrivastava4304Ай бұрын
make one
@joshheaps1099Ай бұрын
@@akshaysrivastava4304 why don't you
@EugeneBuvardАй бұрын
It's not a perfect protocol but it's also heavily monitored, is it?
@damagi7630Ай бұрын
BGP cant be replaced. The new protocol would have to be 100% compatible to the current BGP. So rollout would take forever, just like IPv6.
@James-dv1dfАй бұрын
Yea what you gonna do route redistribution between protocols?
@rigell2764Ай бұрын
We'll fix BGP right after we finish that rollout of IPv6 🙂
@privacyvalued4134Ай бұрын
Not rolling out IPv6 saved everyone's bacon recently. Most home ISPs in the U.S. are still delivering IPv4 only addresses, which means IPv6 packets can't reach those networks, which means those networks and machines were immune to the recent Microsoft TCP stack vulnerabilities involving IPv6.
@seeibeАй бұрын
@@privacyvalued4134 So you're saying first switch everyone to Linux, then finish the IPv6 rollout?
@1creeperbombАй бұрын
@@privacyvalued4134 Jokes on you, all my machines are linux lol
@arduinoguru7233Ай бұрын
@@privacyvalued4134 Recently I watched electronic engineer on his YT channel, ( _he lives in Canada and apparently working on some company_ ) his computer in back of screen was running Windows 7, this guy is smarter/technique than most of his bosses, but he still uses vulnerable OS
@ShahabEslamianАй бұрын
I have IPv6 but I can't run a webserver for some reason. Why should I care about having a global static IP address when the ISP blocks ICMP packets?
@HassanMehdi98Ай бұрын
"The world began to heal, but unfortunately they fixed it and came back online" 😂😂 0:35
@antogdenАй бұрын
😂😂 best quote, cracked me up that.
@belos.2020Ай бұрын
😂
@antonen87Ай бұрын
yeah, pure gold XD
@fanrco766Ай бұрын
1:00 My computer networks class spent two weeks on this for computer science majors. It really is something you should be at least aware about, considering it is the literal backbone of how isolated networks are able to communicate with each other at all.
@TheBelrickАй бұрын
The quality of this video is to be applauded.
@_garicasАй бұрын
I understand mainly because I had a good teach (I was lucky af) and worked in a data center. At first it was a bit weird, but with time is just like the pieces fit together. (and it really does talking about the OSI model)
@jitushekkumar7083Ай бұрын
Two weeks 😮.they spent 20 minutes in mine.
@chocolate_squiggleАй бұрын
@@TheBelrick I haven't worked with BGP extensively for 15 years or so but I think there's some misleading info in here. BGP is much older than 25 years, it DOES have some basic authentication mechanisms, albeit not for every single route advertisement - though even that can be configured to only accept routes that you're expecting to receive - which we always did (and which means you can't pass on bad routes if you don't accept them in the first place). And it isn't a fundamental part of the TCP/IP protocol stack as was stated when showing that jenga tower image, in fact that image is misleading it just shows random protocols written anywhere. Instead BGP literally runs like any regular application over the top of TCP/IP between two systems. It's traffic is encapsulated in regular TCP segments, which is different from some other routing protocols that have their own IP protocol number and transport scheme (which don't use TCP). Since I haven't worked with it a long time I appreciated learning about the newer authentication scheme but the quality here was not 100%.
@TheBelrickАй бұрын
@@chocolate_squiggle Thankyou for your time spent educating us with your knowledge.
@SuperM789Ай бұрын
3:01 the balls to use an image like that today lmao
@Personal-Account-okАй бұрын
It's was pre planned by the USA government. It was a agenda.
@Pntrx-li5lhАй бұрын
@@frankdrebinn what
@Personal-Account-okАй бұрын
@SuperM789 it's all was pre planned by the USA government. It was an agenda.
@MessyMasynАй бұрын
@@frankdrebinn you do realize balls is a real word? plus, the phrase he's using has been around for like a century. your point makes no sense
@slearlАй бұрын
It was a national tragedy, 911.
@FrankGroudonАй бұрын
fun fact: BGP was sketched on a couple of napkins by a bunch of researchers on lunch break. so it's basically literal "napkin math" that has fundamentally determined how one of the most important creations of humankind works, and i don't know if that's funny or scary (both probably)
@mfaizsyahmiАй бұрын
Same story with utf8
@p0t4toePotatoАй бұрын
i wish pne day to attain the skills to pull off napkin ideas on a whim like that
@LabGeckoАй бұрын
In their defense, I doubt they expected their work to be the backbone of all human knowledge (and idiocy). I bet they just wanted the job done.
@FasutonemuMyojiАй бұрын
@@mfaizsyahmi Same story with geo-stationary communication satellites.
@jfbeamАй бұрын
Much of the early internet was like that. Designed surprisingly well by just a handful of people. And then we have the massive steaming piles created by committees -- IPv6, OSPF, SIP...
@DevNeticАй бұрын
0:36 underrated line
@vidbinaАй бұрын
Was looking for this 😅
@TheIdo14Ай бұрын
Reasons I still watch your videos even when sometimes I have no idea what you're talking about in descending order: 1. Memes 2. Sarcasm 3. Maybe Ill learn something new
@itzMRZАй бұрын
3:01 I was literally waiting for this
@DannnnehАй бұрын
Cap. You were only figuratively waiting for it.
@immortalsunАй бұрын
@@Dannnneh‘Literally’ has two definitions.
@monkeyfish227Ай бұрын
Today is the day.
@hexxt_Ай бұрын
happy anniversary
@wavemasterxyra1630Ай бұрын
@@Dannnneh and a Cap is a type of lid.
@OurLastStandАй бұрын
You left out some on the technical securities built into BGP such as TTL limit and explicitly configured adjacencies. Basically all attacks have to occur from an adjacent device. The attacker would first have to compromise a router advertising BGP prefixes to other BGP neighbors for an attack to take place. That is if no other vulnerabilities exist. This is rare, otherwise there would be many more attacks of this nature.
@galewallblanco8184Ай бұрын
Yeah I was wondering about that, "if its so easy to misuse BGP as this video says, why isnt everyone absolutely banging it down to the ground and abusing it?", thank you for your comment!
@jfbeamАй бұрын
The core issue with BGP is one of trust: anyone can announce anything, and it's very difficult to know if they're lying. (which is why RPKI was invented, but few have bothered with it.) The BGP configurations I've managed over the decades have had explicit allowed prefix lists for each and every peer. (except for our transits which are our "0/0" path, those have explicit deny lists - basically they can't announce our own and customer spaces back to us.) And our upstreams maintained similar lists. However, many build those lists with automated tools based on routing registries (radb) which run into the same trust problem.
@OurLastStandАй бұрын
@@jfbeam Yes misconfigurations are the bigger issue because they can and do occur more often. You do have to trust your peering AS. As for the the RKPI feature it can stop advertisement for routes outside of an AS, but not completely stop misconfiguration for prefixes associated to that AS
@FelixH_1242Ай бұрын
1:39 "anonymous systems" made me laugh, like they are all these networks with a black fedora on with a mystery identity. (its autonomous systems)
@thehappyburger6397Ай бұрын
3:30 Too bad no one understands computer science 😢
@SuperMaker.MАй бұрын
It's because nowadays there's too much abstraction on top of everything. even C as a programming language regarded as "low level" is one hell of an abstraction.
@sarmohantyАй бұрын
Nigahiga mentioned let's go
@humusstealr9982Ай бұрын
45 seconds, 2 gazillion view. Bros up now
@NoerLuinАй бұрын
I would love to see a video about the "SCION Internet Architecture" which, among other things, aims to make BGP obsolete.
@DeadlyDragon_Ай бұрын
The entire world has agreed on and uses BGP good luck doing that again on such a fundamental aspect to how the internet works.
@arc8218Ай бұрын
lol good luck
@NoerLuinАй бұрын
@@DeadlyDragon_ Obsolete was not the best word choice. You can layer them if you want to. But SCION can prevent the BGP attacks that he is talking about in the video. I think it is real attractive for ISPs. Some ISPs even support it already.
@DeadlyDragon_Ай бұрын
@@NoerLuin I'll look into it, on a quick read of the homepage it doesn't have much in terms of technical details. I'd need to see exactly what it is doing before I could speak with a more informed opinion of it.
@NoerLuinАй бұрын
@@DeadlyDragon_ They have a lot of resources under the publications tab. There is an open source implementation as well (netsec-ethz/scion).
@chef2654Ай бұрын
I love how at the start of the video I'm like oh no, but then comes the "But its already fixed in the EU" and I'm like "Oh thank god, I'm european"
@theMagosАй бұрын
70% fixed
@jonathanclyde4725Ай бұрын
You think we in Europe are all good if America gets taken out? 😂
@jan.tichavskyАй бұрын
Reminds me of DNSSEC. Heavily used in my country and has been for years, while the rest of the world is slowly catching up.
@IStMlАй бұрын
@@jonathanclyde4725 mostly yeah
@yavoth5850Ай бұрын
The EU will destroy our economy but at least our protocols are slightly better and we forced Apple to put USB-C on iPhones. I'd call that a good deal.
@justinfuruness7954Ай бұрын
Got my PhD in this two weeks ago lol. ROAs, ROV, and the RPKI do almost nothing against an attacker that knows what they’re doing. Bgp is completely broken and because it’s so decentralized it’ll never be fixed.
@kaninchengaming-inactive-6529Ай бұрын
Congratulations on your PHD
@justinfuruness7954Ай бұрын
Thanks!
@arkadiuszniedziela360527 күн бұрын
Could you share more information, or maybe your articles on this? Why is RPKI not enough? No offence - i am genuinely curious :)
@justinfuruness795427 күн бұрын
@@arkadiuszniedziela3605 yt will block links but there’s papers about downgrade attacks on rov. Just block the AS running the rpki and rov will do nothing
@justinfuruness795427 күн бұрын
Forged origin hijacks etc bypass it
@valltzuАй бұрын
As someone who studies CCNP Enarsi, BGP is the most fun but annoying thing to lab and read about.
@williamjohnson4297Ай бұрын
sorry buddy you're going to have to do the CCNP-SP to really learn about it
@valltzuАй бұрын
@@williamjohnson4297 Well, Im still a junior so there is much to learn about everything before I know what to dig into. Besides right now I prefer to work as a consultant and get experience instead of sitting at an ISP.
@_garicasАй бұрын
@@williamjohnson4297 sounds like something that when if think you understand it, you really don't and there's so much more lol
@millertime7891Ай бұрын
I was just about to take a course covering BGP, but was worried that the material would be obsolete soon. Now that I know the government is on the case, I’m confident that the vulnerabilities will be relevant until I retire.
@autentik19Ай бұрын
CCIE here. for all these BGP issues that you have brought up there are already technical solutions. uRPF check, prefix-lists, having the BGP session in a tunnel are just a few... YES! BGP is old, but if you look closely it's in a constant development and issues are being tackled and other technologies are developed with and around BGP... I'd be more afraid of DNS when it comes to the CORE Internet Security. After the big BOOM, most the roads will still be there, but the signs will be missing. :)
@nessitroАй бұрын
shoutout to nigahiga... hearing it brought back memories of old youtube
@ZennExileАй бұрын
Girl you shoulda heard what Sheila was sayin about the internet at the hair salon. She said that nothin but a lil ole NT4 server disk on the wrong network could still roast the entire internet, and there's almost nothing anyone can do about it because all the people who developed these systems are retired, like from breathing. But I ain't one to gossip so you ain't heard that from me.
@jackhand407314 күн бұрын
Retired from breathing is dope. Thank you
@augustaseptemberova5664Ай бұрын
it's been a while since the uni lecture i heard on this, so take the following with a grain of salt: iirc the professor told us the US's low bgp security is most likely by intent. let's say you're some arm of govt that deals with surveillance, then you set up a node that falsely advertises itself as "all popular nodes are most easily reached through me", which will lead a lot of traffic through your node, making that whole surveillance thing very easy. according to that prof, the increased security in the EU is fairly recent and a direct response to the US exploiting gbp vulnerabilities to spy on correspondence by EU govt officials.
@jfbeamАй бұрын
Never attribute to malice what you can explain by laziness. The US internet existed LONG before anyone could spell s-e-c-u-r-i-t-y, so there isn't any, and no one can be bothered to do anything about it. (until someone steals your netblocks...)
@ThePowerLoverАй бұрын
@@jfbeam That's a great lie, the "Never attribute to malice what you can explain by laziness" thing. You should start looking at yourself.
@jgnhrwАй бұрын
@@jfbeam Yes, super smart people and huge companies didn't fix a glaring issue that has caused massive outages because of "laziness", not because someone is benefiting from it... Just like how the US is too lazy to shut down onion routing right?
@randomghost1080Ай бұрын
It's less likely nowadays due to some other security features in other protocols (HTTPS, DNSSEC, etc.). Even if you can hijack the routes, the certificate will be invalid or DNSSEC verification will fail. There are probably other security features too in place. Less likely, cause theoretically you can still get a CA to issue you a new certificate, and force the domain registrar to remove/update the DA record (or just disable DNSSEC) - but that's a huge effort. I agree with @jfbeam, just like IPv6, this seems to be more of a case of laziness since the onus is onto the ISPs and companies to implement it. Sure, the US can enforce it but why will they ever do that?
@the-answer-is-42Ай бұрын
@@jfbeam I don't think that's a good principle to go by, though in this case I think either option is possible. We just didn't think of security back then if we compare it with today... But it's also possible someone from the government was up to no good. EDIT: I guess the laziness one may be more likely in this case (in my opinion, anyway), just saying the other option wouldn't be surprising either. It was just par for the course back then to ignore security.
@tomasprochazka6198Ай бұрын
If it's a local problem, it's DNS. If it's worldwide, it's BGP.
@nicholask.5185Ай бұрын
1:59 BGP was designed 35 years ago, not 25. It's a foundational internet technology so it had to be around before the internet could start taking off.
@dannyarcher6370Ай бұрын
Your mom.
@jmickeyd53Ай бұрын
While 35 years is correct, the internet existed before BGP. EGP, Exterior Gateway Protocol, was the older version of basically the same thing
@imop285Ай бұрын
@@dannyarcher6370 wtf
@nicholask.5185Ай бұрын
@@jmickeyd53 Correct. By "start taking off", I was refering to the 90s. BGP began it's life in 1989.
@ness550Ай бұрын
@@jmickeyd53 arpanet IMNOTTRYNABETHATGUY i know it's a semantical thing im js im js !!
@SassePhotoАй бұрын
Northern Border "keep Canadians out?" LOL, reverse is increasingly true
@cesaramirezfrАй бұрын
Having this released on Sept 11th is perfect timing
@kapytanhookАй бұрын
Why?
@YuriG03042Ай бұрын
3:01
@nossirАй бұрын
0:18 now that's a name i haven heard in years
@funkynerd_comАй бұрын
Ahh.. BGP. I wrote a paper on it back in 1999 for my internship. What a clusterf***k. Shortly after my boss and I had a discussion about the whole "trust me bro" architecture, some numbnuts at TPG Internet (an ISP here is Australia), brodcast routes to their upstream provider, which happened to be Telstra. As in THE backbone provider at the time. Telstra, in their infinite wisdom was actually honouring routes broadcast by ANYONE connecting to their network at the time and whaddya know, it took down the entire eastern chunk of the network from Sydney to Adelaide. I was a senior network engineer at the time and had some of the largest companies in the country as clients and man, that was a fun day. LOL. I will never forget it.
@geeshtaАй бұрын
0:18 Fireship N Word jumpscare
@ParanScreenАй бұрын
Totally agree with your point that BGP essentially works on a 'trust-me-bro' basis. Few years ago I worked for a small IT company, and one day I had to give our ISP with some IP ranges we had to configure peering with. However, I gave them an incorrect IP range (one that we didn't own) by mistake and someone at the ISP actually configured my values on their BGP router without any validation. Fortunately, it didn't cause any issues as the IP range I gave wasn't in use, but my mistake could have broken (well, maybe a tiny fraction of) the Internet if that range had actually been in use. It should never just trust any bro! (including me)
@The_Daily_Facts_of_LifeАй бұрын
'The world began to heal' had me rolling.
@TheKigenАй бұрын
RPKI is not the full solution. Since an attacker could claim the origin AS is behind them. The only reason this doesn't work right now is that generally the upstream will not accept this and it also adds another hop (and BGP routes based on least hops). There is also IRR. But enforcement of IRR is spotty at best.
@bulko89Ай бұрын
Thank you, everyone forgets this. I feel like rpki is more for trying to get all LIRs into administrative order. RPKI protocol currently feels too bulky and odd in its implementation. We need to sign witch autonomous systems are allowed to peer with each other in the ROAs.
@kehlarn6478Ай бұрын
@@bulko89 rpsl/irrd solved all of this long ago. but the US domestic ISPs deemed themselves too important to express their routing policy explicitly. they literally have little idea how to do so in rpsl so they claim it shouldn't be needed. despite the entire purpose of it to be preventing of rogue asn attacks. if your filters are based on accepted rpsl you would see them update their rpsl policy before their live network changes and detect the problem a priory. now think about why you would not want that security as a baseline. now you know why it hasn't changed.
@dischannel888Ай бұрын
Not only that, ARIN disabled RPKI and IRR for anyone with "legacy ip blocks". So if your company (IE every major ISP) had a large block assignment before 1999, RPKI is not available to you.
@ralphc.644Ай бұрын
RPKI RTR version 2 addresses this by adding ASPA support as PDU type 11. ASPA holds tables of AS customers and their providers. It uses this table to validate the AS path of the announcement. I'm in the middle of implementing this for my network.
@kron520Ай бұрын
Kludges upon kludges upon kludges upon kludges.
@CTSFanSamАй бұрын
I just installed Kludges on my system last week. It is great.
@sethbarrett4223Ай бұрын
Just published a paper on this, testing FCC guidelines on RPKI/ROV adoption by top ASes in the US.
@asdf8asdf8asdf8asdfАй бұрын
Loving sarcasm ON POINT
@quickSilverXMenАй бұрын
2:22 WTH bro 🤣🤣🤣
Ай бұрын
4:05 | Whoops! It's 20% off, not 30%! ⚠
@GetShwiftyInHereАй бұрын
I'm studying for my network+ and this video really helped break down what BGP was. I was a bit confused trying to figure it out through a couple paragraphs and diagram .-.
@osknyoАй бұрын
A 9-11 reference on 9/11 is wild
@TheEmolanoАй бұрын
I even forget yesterday was 9/11 lol
@opuser1Ай бұрын
Ah yes. X509 certificates. Yes. Something that surely never ever have caused any issues. Surely no goverment certificate authority would ever issue false cert. Right? No ISP has a goverment mandated bgp peer that they MUST accept ANY advertisements from. Surely.
@maluueuАй бұрын
There are a whole lot of easier ways for governments to hijack routes than this 😂
@m4vfАй бұрын
Thank you for sharing!
@tom_zannaАй бұрын
this time the video is a little late, I would have needed it 1 year ago... but it's always a pleasure to listen to you
@loudthattrack8974Ай бұрын
gotta love the plug at the end
@threeninetwentysevenАй бұрын
Whatever you think happened, 9/11 isn't a joke by any standards. Don't be a psychopath.
@Daktyl198Ай бұрын
ISPs are still refusing to support IPv6 because it means they'll have to upgrade 35 year old equipment. There's no way they're going to implement something on this level. Can't wait for all internet traffic in the US to just stop because the jenga tower IPv4 is sitting on all goes to shit. As it is, I get several MS lower latency when connecting to services over IPv6 instead of IPv4.
@BattousaiHBrАй бұрын
i work at an ISP and i can confirm, there's no way RPKI is being fully implemented before something like ipv6 which has actual real world application to keep customers online. truth is you're often stuck with the cards you're dealt. no business owner in their right mind will want to purchase, labtest, configure, replace, equipment that can go from 100k all the way to the millions, guaranteeing degraded operations during it's replacement, all for the sake of adding a small extra layer of security when the shitty system we have is already proven to be "secure enough" most of the time. the bigger the ISP the bigger the cost and self risk associated with replacing infrastructure, and it's also the big ISPs that have the biggest risk and impact to others when something does go wrong. thankfully the biggest ISPs are also less likely do have something go wrong, whether maliciously or accidentally. for reference, the boxes responsible for routing in the Tbps that terminate sea cables are so expensive that you only afford the minimum reasonable redundancy, and you absolutely never want to take it down for maintenance unless you absolutely need to. in short, i really really doubt RPKI is ever going anywhere globally because of logistics on actually implementing it and the perceived "not really necessary" aspect. personally i hope someone makes something better built on top of BGP itself without a requirement for external validation tools.
@omarjimenezromero3463Ай бұрын
@@BattousaiHBr that has been happening since a lot of time, they just change things when market obliterates them or when government has a bomb on top of them, aside that, those people are not going to change any wire to get those billion bonuses for their "work".
@VaeldargАй бұрын
Lets be honest, there is way. It's the government paying for it. Because that's what all of these kind of companies do: avoid spending any more money on their infrastructure for as long as possible to get as much profit from it as can get -> wait for the government to pay for the upgrade themselves once is big enough an issue -> pretend was them that made the upgrade for the good of their customers -> repeat.
@Daktyl198Ай бұрын
@@Vaeldarg Last time the government tried paying for it, the ISPs took the money and ran with it. They upgraded nothing and never had to pay the money back.
@VaeldargАй бұрын
@@Daktyl198 Why do you think these companies like having the government pay for it so much? It's exactly because sometimes the government messes up with the fine print and it lets them do that ON TOP of getting free upgrades. The problem stays needing to be fixed, so the government is forced to just have to give more money anyway.
@dischannel888Ай бұрын
RPKI and IRR can't work in the USA because arin doesn't allow it for customers who are considered legacy (before 1999).
@iksakuАй бұрын
Smooth ad transition… Love it
@mark.martinkovicsАй бұрын
The picture of the towers around this time of the year is wild
@hhkl3bhhksm466Ай бұрын
Love these concise and informative videos. No wonder this channel blew up so quickly in such a short amount of time.
@bulko89Ай бұрын
This might work for a accidentall error, but if I want to pull traffic I can still act as a transit partner for the victim AS. With a fake copy of the victim AS. That way rpki won't notice anything. It is like checking if the name and address of the sending party, and if those match but the bad guy is working for the post office.
@StarTrekz35Ай бұрын
This video came out right when I'm learning about EGPS for the CCNA
@npc-drewАй бұрын
Another banger, your comedy bits are always on point, that "waiting for the problem to be fixed because you paid your taxes" is wild. XD
@osquigeneАй бұрын
It took me 2 years working with BGP experts to understand that it wasnt really a shortest path protocol, but rather a "quite short paths unless expensive" protocol. It's heavily influenced by financial interests.
@spfyАй бұрын
If hackers somehow get a domain to route to a fake website, wouldn't users' browsers complain that the certificate doesn't match? Isn't this one of the main reasons HTTPS exists? Or did this crypto site not use HTTPS? I guess users could always just assume it's a non-issue and bypass the warnings...
@gustavstreicher4867Ай бұрын
Having control of this FQDN, they could quickly have a brand new TLS certificate issued for it via certbot since all you need to get certified is to prove that you have control of the FQDN. They had this control because they hijacked the DNS records (Route 53 is the AWS DNS service). Certbot basically just communicates with LetsEncrypt via the ACME protocol which will send an HTTP-01 challenge to the FQDN at port 80 and see if your server responds appropriately. So, if someone can override your DNS, they can steal your TLS certification as well. You can prevent this by issuing your own TLS certificates and installing your Root or Intermediate CA certificate in the browsers that are allowed to visit your site, but this proves to be practically ludicrous if you want anyone to be able to access your site.
@gustavstreicher4867Ай бұрын
I don't know why my previous comment doesn't show, so I'll repeat it here. To get a TLS certificate issued to your server you usually use something like certbot. All certbot does is communicate with LetsEncrypt via the ACME protocol. LetsEncrypt tests your server by sending it an HTTP-01 challenge on port 80. This challenge is drected at the FQDN you claim to own. The very same FQDN that your DNS (Route 53 is the AWS DNS service) is resolving to your servers IP address. So, if they've hijacked the DNS records that resolve the given FQDN to their malicious server, then they can easily convince LetsEncrypt to issue them a brand new TLS certificate saying they are the FQDN owners. Your browser will happily check the malicious site as secure. The only way to prevent this is to issue your own TLS certificates and to install your Root or Intermediate CA certificates in all of the browsers that are allowed to have access to your site. If you need random people to be able to sign up and use your site, this is obviously impractical and no-one does it.
@gustavstreicher4867Ай бұрын
If someone overrides your DNS record that maps the trusted FQDN to your sites IP address, they can just issue a new TLS certificate for their server and your browser will happily mark it as safe.
@gustavstreicher4867Ай бұрын
This is super simple to do in like less than 5 seconds if their server is prepped with certbot.
@gustavstreicher4867Ай бұрын
The only way to stop this with HTTPS (TLS) is to issue your own certificates and to manually install your Root or Intermediate CA certs in all the browsers that are allowed access to your site.
@giabag1001Ай бұрын
I'm learning Introduction to networks and this is so helpful...
@EmeraldKaiserАй бұрын
the segway was beautifully smooth
@dischannel888Ай бұрын
RPKI and IRR aren't available for anyone with a large legacy IP block, which is another reason why it's not enforced in the USA. A huge % of the IPs are old.
@gitasuputra8371Ай бұрын
the ad was so smooth, i didn't see it coming
@whatareyousaying339Ай бұрын
BGP has lasted primarily because OSPF is a link state protocol used inside an autonomous system. But imagine link state for the entire internet. It would be terribly slow. This is an oversimplified example but BGP is really the only protocol suitable for exchanging AS to AS information.
@mrZeeeeeАй бұрын
Good to see a new video from Fireship. For a second, I tough this news title is about the newest Jeff hustle: Man Arrested for Creating Fake Bands With Al, Then Making $10 Million by Listening to Their Songs With Bots
@BroXplainsАй бұрын
I love the way you speak😅 and the humor you always bring to the table❤
@Sahil.1Ай бұрын
Note: Ignore if javascript was harmed in this video
@wyattkoch7097Ай бұрын
How is no one talking about how Fireship made a route hijacking video on 9/11, with a 9/11 joke in it
@stiven97lolАй бұрын
3:01
@RIFOU-FFАй бұрын
As a networking engineer myself... I loved every millisecond of this video...
@michaeld5388Ай бұрын
Bro’s content has been straight fire, fr a fireship
@BudgiePanicАй бұрын
Learning about BGP at university, must be fun being the people turning those connections on
@bmansanАй бұрын
3:00 Nice consideration
@kjeksomanenАй бұрын
Not only is BGP the backbone of the Internet, but it has increasingly also been used in large scale data center networks, and can actually be very nice when applied appropriately.
@cryptonativeАй бұрын
So strange to get a video that's not about hype tech
@Dr_LarkenАй бұрын
3:02 respect, Not holding back today, are you? Love it! Especially “ in remembrance of those lost on 9/11” sneaky sneaky!
@Dangit-DaveАй бұрын
39% totally makes sense. Working for ISPs I’m surprised routes are still running
@Ashk3000PersonalАй бұрын
I swear you always make video right after i research them on my own
@JamesWendelАй бұрын
I'm sad he didn't mention the IRR (internet route registry) which some large companies use to filter routes to prevent BGP hijacks.
@Ich_liebe_brezelnАй бұрын
lol, when you said Border Gateway Protocol my PC just freezed and repeated your voice for a moment and I thought it was part of the video XDDDDDDDDDD.
@lamaistulАй бұрын
BGP was created when the Internet was free and alive. Updates are necessary to enforce more surveillance.
@egonkirchofАй бұрын
These protocols are made simple not by mistake. The thng is the simpler it is the faster it is as well.
@GyroMixesАй бұрын
love the way you portrayed JS as the clown in serious business.
@KapnKreggАй бұрын
The main takeaway here is that the band Phish are time travelers who knew that the term "phishing attacks" would net them a lot of free publicity.
@Matthew-dp3hfАй бұрын
Network engineer here. You did a good job conveying that that the internet was not built to anticipate bad actors. Obviously, that changed quickly. However, many protocols in the Internet protocol suite (TCP/IP) we're developed during a time that prioritized transmission accuracy and innovation of technology over security. In the same vein, the border gateway protocol assumes trustworthiness between network operators. It's important to point out that not all autonomous systems will announce networks or provide routes, because some autonomous system administrators may choose to do so for security purposes.
@marcellkovacs5452Ай бұрын
The most recent Veritasium video suggests that the phone network suffers from the same "trust me bro" vulnerability
@Guy_SandlerАй бұрын
0:18 nigahiga? I haven't heard that name in years
@WombosvideoАй бұрын
Here's another one: Freddie Wong
@TinohCostaАй бұрын
This is not a tech channel, this is a meme Channel 😂
@qrdacoda9816Ай бұрын
Thanks, we appreciate your brilliance :)
@orthodoxic7349Ай бұрын
i am surprised this entire video has ZERO 9/11 jokes ....... like.....today was the day for such jokes
@GatienL.Ай бұрын
Well, clearly a 9/11 reference/joke at 03:01
@JGott0001Ай бұрын
The 1X speed dialogue at the end was unsettling…
@sakurascrollsАй бұрын
There is always a hole. The question is how deep the rabbit can go.
@SirThane13Ай бұрын
Just started the video and I have no idea what the "Border Gateway Protocol" is, but the name has such strong Cyberpunk "Blackwall" vibes to it.
@John_VersusАй бұрын
"When facebook was down the world begin to heal but unfortunately they fixed it and came back online." 😂
@MordenpersonАй бұрын
I've watched a lot of the videos from this channel but never subbed. I just subbed, this channel is a gold mine in multiple ways.
@rida_brahimАй бұрын
Whoever is going to try brilliant for free, make sure to cancel 2 days before that month is done because you will be forced to pay and won't be able to cancel manually
@leonlysak4927Ай бұрын
Maybe the best BGP is the friends we made along the way
@jtcrawfo1Ай бұрын
Dang, I was hoping Fireship would cover administrative distances with other routing protocols and break down interior and exterior BGP.
@vineboomsoundeffect5395Ай бұрын
The code report should be named the tech report (day 3)
@SuperRobieboyАй бұрын
Please make a video about ICP (Internet Computer Protocol) and how it relates to all this stuff. You'd make me very happy!
@RoddieHАй бұрын
25 years? I wish.
@MuhammadbinYusratАй бұрын
Govt official in Pakistan trying to censor the internet was so spot on 🤣🤣
@smithdoesstuffАй бұрын
You killed me with Taylor Swift and NVidia holding up the US economy!!! Dude, keep this up please it's one of the few truly enjoyable things in my life rn