[70151] in North American Network Operators' Group
Re: BGP Exploit
daemon@ATHENA.MIT.EDU (Patrick W.Gilmore)
Mon May 3 20:00:11 2004
In-Reply-To: <D63319ADBCA8D211B8210008C7B1795631577FB5@SIGMA1>
Cc: Patrick W.Gilmore <patrick@ianai.net>
From: Patrick W.Gilmore <patrick@ianai.net>
Date: Mon, 3 May 2004 19:02:54 -0400
To: nanog@merit.edu
Errors-To: owner-nanog-outgoing@merit.edu
On May 3, 2004, at 6:26 PM, kwallace@pcconnection.com wrote:
> Now that the firestorm over implementing Md5 has quieted down a bit, is
> anybody aware of whether the exploit has been used?
> Feel free to reply off list.
I would also be interested in what %-age of peers are MD5-ized? And if
anyone has had any operational issues with the MD5 process - issues
contacting peers, software incompatibility, varying key synchronization
processes, additional CPU, re-writing internal tools, monitoring
MD5-ness, etc.?
Happy to collect the data off-list and reply with the summarized /
anonymized stats.
--
TTFN,
patrick