[129185] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Did your BGP crash today?

daemon@ATHENA.MIT.EDU (Florian Weimer)
Sat Aug 28 08:28:03 2010

From: Florian Weimer <fw@deneb.enyo.de>
To: Raymond Dijkxhoorn <raymond@prolocation.net>
Date: Sat, 28 Aug 2010 14:27:54 +0200
In-Reply-To: <alpine.LFD.2.00.1008281420470.32442@noc.prolocation.net>
	(Raymond Dijkxhoorn's message of "Sat, 28 Aug 2010 14:21:31 +0200
	(CEST)")
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

* Raymond Dijkxhoorn:

> Not sure if the link was posted allready ...
>
> http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4411f.shtml

Cisco posts their advisories to the NANOG list.

> 'The vulnerability manifests itself when a BGP peer announces a prefix
> with a specific, valid but unrecognized transitive attribute. On
> receipt of this prefix, the Cisco IOS XR device will corrupt the
> attribute before sending it to the neighboring devices. Neighboring
> devices that receive this corrupted update may reset the BGP peering
> session.'

I'm not sure what you intend to say by quoting this part of the
advisory.  If you think that it's an IOS XR bug which only needs
fixing in IOS XR, you're showing the very attitude which has stopped
us from making the network more resilient to these types of events.


home help back first fref pref prev next nref lref last post