[69888] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP/BGP vulnerability - easier than you think

daemon@ATHENA.MIT.EDU (Iljitsch van Beijnum)
Wed Apr 21 07:04:09 2004

In-Reply-To: <20040421104414.GA83652@latency.net>
Cc: nanog@merit.edu
From: Iljitsch van Beijnum <iljitsch@muada.com>
Date: Wed, 21 Apr 2004 13:00:07 +0200
To: Adam Rothschild <asr+nanog@latency.net>
Errors-To: owner-nanog-outgoing@merit.edu


On 21-apr-04, at 12:44, Adam Rothschild wrote:

> All things considered, I think MD5 authentication will lower the bar
> for attackers, not raise it.  I'm sure code optimizations could fix
> things to some degree, but that's just not the case today.

> Which begs the question, what is one to do,

How about:

access-list 123 deny   tcp any any eq bgp rst log-input
access-list 123 deny   tcp any eq bgp any rst log-input

Unfortunately, not all vendors are able to look at the RST bit when 
filtering...


home help back first fref pref prev next nref lref last post