[70151] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BGP Exploit

daemon@ATHENA.MIT.EDU (Patrick W.Gilmore)
Mon May 3 20:00:11 2004

In-Reply-To: <D63319ADBCA8D211B8210008C7B1795631577FB5@SIGMA1>
Cc: Patrick W.Gilmore <patrick@ianai.net>
From: Patrick W.Gilmore <patrick@ianai.net>
Date: Mon, 3 May 2004 19:02:54 -0400
To: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu


On May 3, 2004, at 6:26 PM, kwallace@pcconnection.com wrote:

> Now that the firestorm over implementing Md5 has quieted down a bit, is
> anybody aware of whether the exploit has been used?
> Feel free to reply off list.

I would also be interested in what %-age of peers are MD5-ized?  And if 
anyone has had any operational issues with the MD5 process - issues 
contacting peers, software incompatibility, varying key synchronization 
processes, additional CPU, re-writing internal tools, monitoring 
MD5-ness, etc.?

Happy to collect the data off-list and reply with the summarized / 
anonymized stats.

-- 
TTFN,
patrick


home help back first fref pref prev next nref lref last post