[81660] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: md5 for bgp tcp sessions

daemon@ATHENA.MIT.EDU (Patrick W. Gilmore)
Thu Jun 23 00:33:17 2005

In-Reply-To: <20050623041412.GY696@overlord.e-gerbil.net>
Cc: "Patrick W. Gilmore" <patrick@ianai.net>
From: "Patrick W. Gilmore" <patrick@ianai.net>
Date: Thu, 23 Jun 2005 00:32:27 -0400
To: nanog@merit.edu
Errors-To: owner-nanog@merit.edu


On Jun 23, 2005, at 12:14 AM, Richard A Steenbergen wrote:

> Just please realize that this is a trivial layer of security, an extra
> little bit of insurance to make it harder to alter the packets in  
> flight
> or screw with the delivery protocol, and as such the key is not a  
> state
> secret. I am going to seriously hurt the next person who wants to  
> exchange
> phone numbers via pgp encrypted email so that we can have a conference
> call to set up a meeting where we can whisper MD5 keys to each  
> other in
> pig latin while standing under the god damned cone of silence and then
> shoot the engineers who configured it on the router afterwards.

It's not just trivial, it's nearly useless.

Would someone please raise their hand if they have ever seen this  
attack in the wild?  Anyone?

Seems the TTL hack is much more effective at guarding against this  
sort of thing, doesn't require "secrets", far less CPU intensive,  
easier to configure, etc., etc., etc.

Want security?  I suggest you use something that has more benefit  
than cost.

-- 
TTFN,
patrick

home help back first fref pref prev next nref lref last post