[42531] in North American Network Operators' Group
RE: What Worked - What Didn't
daemon@ATHENA.MIT.EDU (Patrick W. Gilmore)
Mon Sep 17 16:48:48 2001
Message-Id: <5.1.0.14.2.20010917161919.04a0d778@127.0.0.1>
Date: Mon, 17 Sep 2001 16:21:06 -0400
To: nanog@merit.edu
From: "Patrick W. Gilmore" <patrick@ianai.net>
Cc: Alex Bligh <alex@alex.org.uk>
In-Reply-To: <258459214.1000761536@[195.224.237.69]>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Errors-To: owner-nanog-outgoing@merit.edu
At 09:18 PM 9/17/2001 +0100, Alex Bligh wrote:
>--On Monday, 17 September, 2001 2:32 PM -0400 "Patrick W. Gilmore"
><patrick@ianai.net> wrote:
>
>> Maybe I missed something?
>
>Only all the well documented attacks (including DoS).
>Think about sending RST to BGP port (and other random
>ports) on your routers.
I was under the impression that MD5 would not stop an RST attack. It that
incorrect?
And if you filtered on source IP for all your downstreams, this would solve
that problem. (Unless the attacker was a major carrier, in which case he
may very well be in possession of your MD5 passphrase.)
>Alex Bligh
--
TTFN,
patrick