[69813] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP RST attack (the cause of all that MD5-o-rama)

daemon@ATHENA.MIT.EDU (Patrick W.Gilmore)
Tue Apr 20 16:27:23 2004

In-Reply-To: <Pine.LNX.4.44.0404202023240.15106-100000@server2.tcw.telecomplete.net>
Cc: Patrick W.Gilmore <patrick@ianai.net>
From: Patrick W.Gilmore <patrick@ianai.net>
Date: Tue, 20 Apr 2004 15:38:28 -0400
To: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu


On Apr 20, 2004, at 3:24 PM, Stephen J. Wilcox wrote:

> On Tue, 20 Apr 2004, James wrote:
>
>> i can see this 'attack' operational against a multihop bgp session 
>> that's
>> not md5'd.
>>
>> now the question is... would this also affect single-hop bgp sessions?
>> my understanding would be no, as single-hops require ttl set to 1.
>
> you can engineer packets to make sure they have the right ttl when 
> they arrive,
> ie if your 10 hops away, set ttl to 10 and it will be 1 on arrival :)

Not if you use the TTL hack.

Seems like that would be much more useful, and less CPU intensive, and 
less prone to user error, etc., etc. than MD5

-- 
TTFN,
patrick


home help back first fref pref prev next nref lref last post