[69812] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

IP economics morphed into (TCP/RST)

daemon@ATHENA.MIT.EDU (Blaine Christian)
Tue Apr 20 15:35:03 2004

From: "Blaine Christian" <blaine.christian@mci.com>
To: "'Stephen J. Wilcox'" <steve@telecomplete.co.uk>,
	"'Patrick W.Gilmore'" <patrick@ianai.net>
Cc: <nanog@merit.edu>
Date: Tue, 20 Apr 2004 15:29:29 -0400
In-reply-to: <Pine.LNX.4.44.0404201856430.15106-100000@server2.tcw.telecomplete.net>
Errors-To: owner-nanog-outgoing@merit.edu



> The other is our new hot topic of security, not sure if=20
> anyone has thought of this yet (or how interesting it is) but=20
> the nature of the bgp attack means that if you can view a BGP=20
> session you can figure things about a peer that would=20
> otherwise be hidden from you in particular the port numbers=20
> in use.. and I'm not=20
> entirely clear on the details but it sounds like when you hit=20
> the first session,=20
> you can take the rest out very easily.
>=20
> We cant take BGP out of band (yet!), perhaps we can keep it=20
> better hidden from=20
> view tho..

There are more protection methods available than just MD5 (as you allude =
to
Steve).  One mitigator is to use "non-routed" space for BGP peer
connections.  If you have the ability to filter on TTL 255 you are in =
even
better shape (arguably perfectly secure against all but
configuration/hardware failures).  You have some vulnerability with
non-routed space if you do default routing or have folks who default =
towards
the device doing the BGP peering though.  Source routing is also a =
potential
hazard for the non-routed solution (does anyone have this enabled =
anymore?).

Apologies for the morph but this raised a great point.  =20

Regards,

Blaine


home help back first fref pref prev next nref lref last post