[70393] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BGP Exploit

daemon@ATHENA.MIT.EDU (Iljitsch van Beijnum)
Thu May 13 08:17:44 2004

In-Reply-To: <71E4603E9370D51190A90080C82D91BB794D87@mail.office.avensys.net>
Cc: nanog@merit.edu
From: Iljitsch van Beijnum <iljitsch@muada.com>
Date: Thu, 13 May 2004 14:16:32 +0200
To: Mark Johnson <mark@avensys.net>
Errors-To: owner-nanog-outgoing@merit.edu


On 13-mei-04, at 13:31, Mark Johnson wrote:

> I think what I'm trying to ask is:

> 1. Does anyone know if the exploit is actually being used? and
> 2. I assume there is no way to identify an exploit reset from the usual
> resets caused by routers hanging, ports failing, DDoS's, etc. However, 
> I
> thought I'd ask...

This is from a couple of weeks, give or take, on an interface with 100 
or so peers:

     deny tcp any any eq bgp rst log-input (3714 matches)

If this is an attack I wish they were all like this.  :-)


home help back first fref pref prev next nref lref last post