[69805] in North American Network Operators' Group
Re: TCP RST attack (the cause of all that MD5-o-rama)
daemon@ATHENA.MIT.EDU (James)
Tue Apr 20 14:54:52 2004
Date: Tue, 20 Apr 2004 14:54:16 -0400
From: James <haesu@towardex.com>
To: Mike Tancsa <mike@sentex.net>
Cc: nanog@merit.edu
In-Reply-To: <6.0.3.0.0.20040420133512.0793abc0@209.112.4.2>
Errors-To: owner-nanog-outgoing@merit.edu
now let me take a bite at this :P
i can see this 'attack' operational against a multihop bgp session that's
not md5'd.
now the question is... would this also affect single-hop bgp sessions?
my understanding would be no, as single-hops require ttl set to 1.
-J
On Tue, Apr 20, 2004 at 01:36:09PM -0400, Mike Tancsa wrote:
>
>
>
> http://www.uniras.gov.uk/vuls/2004/236929/index.htm
>
> --------------------------------------------------------------------
> Mike Tancsa, tel +1 519 651 3400
> Sentex Communications, mike@sentex.net
> Providing Internet since 1994 www.sentex.net
> Cambridge, Ontario Canada www.sentex.net/mike
--
James Jun TowardEX Technologies, Inc.
Technical Lead Network Design, Consulting, IT Outsourcing
james@towardex.com Boston-based Colocation & Bandwidth Services
cell: 1(978)-394-2867 web: http://www.towardex.com , noc: www.twdx.net