[69855] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP/BGP vulnerability - easier than you think

daemon@ATHENA.MIT.EDU (Joe Abley)
Wed Apr 21 00:23:03 2004

In-Reply-To: <9FEFB8DE-9345-11D8-B101-000A9578BB58@ianai.net>
Cc: nanog@merit.edu
From: Joe Abley <jabley@isc.org>
Date: Wed, 21 Apr 2004 00:19:44 -0400
To: Patrick W.Gilmore <patrick@ianai.net>
Errors-To: owner-nanog-outgoing@merit.edu



On 20 Apr 2004, at 23:40, Patrick W.Gilmore wrote:

> And how do you track a thousand passwords?  Okay, maybe that is not 
> too hard.

Right :-)

> But how do you guarantee a thousand peers will never screw up and 
> forget, lose, fat-finger, etc. a single one of them?  This one I would 
> really like to know, 'cause I sure as hell can't figure it out.

If someone forgets a password, you talk on the phone and agree a new 
one, and apply it to both sides. It's the same kind of procedure that I 
guess we would follow if peers spontaneously forgot our IP addresses or 
AS numbers. Or you could just tell them what their password is, since 
you have all the details in your peering database (see above).

(If the reaction to this is "hey, not everybody has a peering database 
you know" then people should let me know; we can tidy up and publish 
the postgres schema that we use if there is interest).


Joe


home help back first fref pref prev next nref lref last post