[111942] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: anyone else seeing very long AS paths?

daemon@ATHENA.MIT.EDU (Mike Lewinski)
Tue Feb 17 14:02:54 2009

Date: Tue, 17 Feb 2009 12:02:50 -0700
From: Mike Lewinski <mike@rockynet.com>
To: nanog@nanog.org
In-Reply-To: <20090217185434.GA9548@ajax.opentransit.net>
Errors-To: nanog-bounces@nanog.org

German Martinez wrote:

> Workaround: Configure the bgp maxas limit command in such
> as way that the maximum length of the AS path is a value below 255. When the
> router receives an update with an excessive AS path value, the prefix is
> rejected and recorded the event in the log.
> 
> This workaround has been suggested previously by Hank.
> 
> Anyone knows about any possible CPU impacts in case that you implement 
> bgp maxas?

bgp max-as will NOT protect you from this exploit (but if you are not 
vulnerable it should prevent you from propogating it).

As far as I can tell the ONLY defense for a vulnerable IOS is to not run 
BGP. Dropping every received route with a filter on 0/0 does not 
mitigate the attack - as soon as that bogus as-path is received the BGP 
session resets, even if the route is never actually installed (and as 
far as I can tell the only real effect of the "bgp maxas-limit 75" is to 
cause all paths with more than 75 ASN to not be installed in the routing 
table).



home help back first fref pref prev next nref lref last post