[42531] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: What Worked - What Didn't

daemon@ATHENA.MIT.EDU (Patrick W. Gilmore)
Mon Sep 17 16:48:48 2001

Message-Id: <5.1.0.14.2.20010917161919.04a0d778@127.0.0.1>
Date: Mon, 17 Sep 2001 16:21:06 -0400
To: nanog@merit.edu
From: "Patrick W. Gilmore" <patrick@ianai.net>
Cc: Alex Bligh <alex@alex.org.uk>
In-Reply-To: <258459214.1000761536@[195.224.237.69]>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Errors-To: owner-nanog-outgoing@merit.edu


At 09:18 PM 9/17/2001 +0100, Alex Bligh wrote:

 >--On Monday, 17 September, 2001 2:32 PM -0400 "Patrick W. Gilmore"
 ><patrick@ianai.net> wrote:
 >
 >> Maybe I missed something?
 >
 >Only all the well documented attacks (including DoS).
 >Think about sending RST to BGP port (and other random
 >ports) on your routers.

I was under the impression that MD5 would not stop an RST attack.  It that 
incorrect?

And if you filtered on source IP for all your downstreams, this would solve 
that problem.  (Unless the attacker was a major carrier, in which case he 
may very well be in possession of your MD5 passphrase.)


 >Alex Bligh

--
TTFN,
patrick


home help back first fref pref prev next nref lref last post