[69912] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Winstar says there is no TCP/BGP vulnerability

daemon@ATHENA.MIT.EDU (Peering)
Wed Apr 21 12:16:40 2004

Date: Wed, 21 Apr 2004 12:15:39 -0400
From: "Peering" <Peering@xspedius.com>
To: "Michel Py" <michel@arneill-py.sacramento.ca.us>,
	"Iljitsch van Beijnum" <iljitsch@muada.com>,
	"David Luyer" <david@luyer.net>
Cc: <nanog@merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu



> If you have a fully redundant internal BGP, and are running all=20
> 12.2S/12.3/12.2T, then you can rather safely do the internal BGP=20
> passwords without a customer notice, expecting no session drop but=20
> knowing if one did you'd have routes via a second BGP reflector=20
> anyway.

Just an FYI, when we changed sessions that had full routing tables on
them at 2am CST with barely any traffic, it causes malloc failures on
the Cisco 7513.  So it's something I would reserve for a maintenance
window if you have one.

home help back first fref pref prev next nref lref last post