scbrg an hour ago

Hmm. I friend of mine claimed that requesting trade with another player in World of Warcraft crashed his router. When he needed to trade, he always insisted that the other player should initiate the transaction.

I was tempted to discard this as pure imagination, but this was a smart and knowledgeable fellow who worked as a programmer, so I'm assuming he had done some investigation before he came to this conclusion.

I know too little about networking equipment, but I can see how certain byte sequences (timed right?) would have some magic meaning. Given enough traffic you're likely to end up sending just such a sequence eventually. Perhaps certain versions of the WoW client spat out just such a magic sequence for the particular router he happened to use?

  • koz1000 an hour ago

    My last name contains the character sequence "rz".

    Back in the BBS days this would trigger a Zmodem transfer on certain clients. It made a lot of people upset.

Modified3019 3 hours ago

>An excel spreadsheet crashed this company's network.

>But it wasn't malware.

>The truth is much weirder.

>Try this out, open up a xls (not xlsx) file in your favorite text/hex editor. Notice all the repeating characters in the header.

>When receiving POP3 emails with an excel attachment, the characters bit patterns caused a signalling pattern on the physical copper of the company's T1 line, crashing the network equipment.

ainiriand 18 minutes ago

So if you know the proper byte sequences (incantations) you can basically mess (do magic) with some routers.

MereInterest an hour ago

Avoiding this issue would be a pleasant side effect of encryption. Since encrypted data is indistinguishable from noise, it wouldn’t matter if the underlying format has specific bit patterns that mimic a signal pattern.

  • Certified 42 minutes ago

    In a monkeys in front of a typewriter world, statistically, you are as likely to have a one off event that matches a specific bit pattern in the underlying format as you would the encrypted format. It would not be reproducible though since most encryption uses nonces

teeray 33 minutes ago

In phreaking tradition I think it’s appropriate to call this the Excel Box.

bombcar an hour ago

Low level signaling is a completely different work that we never even bother to think about these days - but it has its own idiosyncrasies and strangeness that has - mostly - been factored out.

Especially since modern encryption means that the same byte sequence on the wire will not be sent even if you do the exact same thing again. It covers quite a few sins.

JSDevOps 3 hours ago

Unless it’s satire and I’ve missed the point. I'd have thought this wouldn't physically be possible because of the OSI model.

  • teraflop 40 minutes ago

    Oh, it's entirely possible in principle (I don't know about the details of T1 in this specific case).

    Many years ago, there used to be a vulnerability with a lot of modems where you could send a ping packet to a machine connected via dialup, and the machine would send back a response that its modem would interpret as telling it to hang up the call: https://seclists.org/bugtraq/1998/Sep/192

    The OSI model is an abstraction that can be broken by implementation bugs or design flaws, not an immutable law of the universe.

    EDIT: I see that some of the Twitter replies beat me to mentioning this.

  • Ekaros 27 minutes ago

    OSI model makes it more possible. After all for each layer anything above it is just well bits... And if some layer is poorly implemented it can interpret certain run of bits as something else and act accordingly, but wrong.

    There is lot of bad code specially when you have multiple implementations and all doing their own thing on their own level.

  • iphoneisbetter an hour ago

    > JSDevOps says lower level bitstream-induced error is "fucking bollocks".

    Surely, JSDevOps knows what he is talking about. I will rest peacefully with this in mind.

    • lantry 38 minutes ago

      there's no need to be a jerk