[70163] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BGP Exploit

daemon@ATHENA.MIT.EDU (Kurt Erik Lindqvist)
Tue May 4 05:24:32 2004

In-Reply-To: <D63319ADBCA8D211B8210008C7B1795631577FB5@SIGMA1>
Cc: nanog@merit.edu
From: Kurt Erik Lindqvist <kurtis@kurtis.pp.se>
Date: Tue, 4 May 2004 10:41:00 +0200
To: kwallace@pcconnection.com
Errors-To: owner-nanog-outgoing@merit.edu


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>
> Now that the firestorm over implementing Md5 has quieted down a bit, is
> anybody aware of whether the exploit has been used?
> Feel free to reply off list.

Even more interesting, did anyone manage to reproduce it?

- - kurtis -

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQJdXIKarNKXTPFCVEQJKTwCgmyDLv/H3Ho/iaor6RBAx3Mqy3dMAoPiF
rVKmj6c4p/dHGu4I1AFvBH01
=dnJN
-----END PGP SIGNATURE-----


home help back first fref pref prev next nref lref last post