[69889] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP/BGP vulnerability - easier than you think

daemon@ATHENA.MIT.EDU (Daniel Roesen)
Wed Apr 21 07:20:36 2004

Date: Wed, 21 Apr 2004 13:19:51 +0200
From: Daniel Roesen <dr@cluenet.de>
To: nanog@merit.edu
Mail-Followup-To: nanog@merit.edu
In-Reply-To: <0D4157D6-9383-11D8-A922-000A95CD987A@muada.com>; from iljitsch@muada.com on Wed, Apr 21, 2004 at 01:00:07PM +0200
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, Apr 21, 2004 at 01:00:07PM +0200, Iljitsch van Beijnum wrote:
> > All things considered, I think MD5 authentication will lower the bar
> > for attackers, not raise it.  I'm sure code optimizations could fix
> > things to some degree, but that's just not the case today.
> 
> > Which begs the question, what is one to do,
> 
> How about:
> 
> access-list 123 deny   tcp any any eq bgp rst log-input
> access-list 123 deny   tcp any eq bgp any rst log-input
> 
> Unfortunately, not all vendors are able to look at the RST bit when 
> filtering...

The general ignorance to the fact that SYN works as well is
astonishing. :-)

home help back first fref pref prev next nref lref last post