[69805] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP RST attack (the cause of all that MD5-o-rama)

daemon@ATHENA.MIT.EDU (James)
Tue Apr 20 14:54:52 2004

Date: Tue, 20 Apr 2004 14:54:16 -0400
From: James <haesu@towardex.com>
To: Mike Tancsa <mike@sentex.net>
Cc: nanog@merit.edu
In-Reply-To: <6.0.3.0.0.20040420133512.0793abc0@209.112.4.2>
Errors-To: owner-nanog-outgoing@merit.edu


now let me take a bite at this :P

i can see this 'attack' operational against a multihop bgp session that's
not md5'd.

now the question is... would this also affect single-hop bgp sessions?
my understanding would be no, as single-hops require ttl set to 1.

-J


On Tue, Apr 20, 2004 at 01:36:09PM -0400, Mike Tancsa wrote:
> 
> 
> 
> http://www.uniras.gov.uk/vuls/2004/236929/index.htm
> 
> --------------------------------------------------------------------
> Mike Tancsa,                          	          tel +1 519 651 3400
> Sentex Communications,     			  mike@sentex.net
> Providing Internet since 1994                    www.sentex.net
> Cambridge, Ontario Canada			  www.sentex.net/mike

-- 
James Jun                                            TowardEX Technologies, Inc.
Technical Lead                        Network Design, Consulting, IT Outsourcing
james@towardex.com                  Boston-based Colocation & Bandwidth Services
cell: 1(978)-394-2867           web: http://www.towardex.com , noc: www.twdx.net

home help back first fref pref prev next nref lref last post