1) Suppose the adversary finds a vulnerability in the Internet routing protocols that lets him control the routes that packets take from your machine to other systems. What security consequences this have? Which of availability, confidentiality, integrity could be violated, and why? 2) At Berkeley, like many other places, we use a DNS central cache: end-user machines are configured so they send DNS queries to the cache (a single server run by Berkeley); if the cache has previously seen this query, it sends the cached response, otherwise it does the DNS lookup and caches the response. Suppose an attacker manages to gain control of that server. What would be the security consequences for Berkeley users? 3) What's the one thing you'd most like us to discuss in class, after reading the Bellovin paper?