[69970] in North American Network Operators' Group
Re: Winstar says there is no TCP/BGP vulnerability
daemon@ATHENA.MIT.EDU (E.B. Dreger)
Thu Apr 22 18:03:34 2004
Date: Thu, 22 Apr 2004 21:59:52 +0000 (GMT)
From: "E.B. Dreger" <eddy+public+spam@noc.everquick.net>
To: NANOG <nanog@merit.edu>
In-Reply-To: <Pine.GSO.4.58.0404202302000.12672@dragon.as23028.net>
Errors-To: owner-nanog-outgoing@merit.edu
RT> Date: Tue, 20 Apr 2004 23:11:28 -0500 (CDT)
RT> From: Rob Thomas
RT> We manage well over 150 peering sessions with MD5 passwords
RT> in place. This includes bogon peering, route-server peering,
CYMRU bogon (et al.) route servers are an example of where MD5 or
IPSec definitely is a good idea. However, most peer/peer and
carrier/downstream BGP sessions aren't multihop spanning a
network or three.
Of course, if ingress SAV were universal...
Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_________________________________________________________________
DO NOT send mail to the following addresses :
blacklist@brics.com -or- alfra@intc.net -or- curbjmp@intc.net
Sending mail to spambait addresses is a great way to get blocked.