Alternatives to MD5 [Re: Winstar says there is no TCP/BGP vulnerability]

2004-04-21 Thread Pekka Savola
On Tue, 20 Apr 2004, Rodney Joffe wrote: However, perhaps someone from Winstar would care to help us all understand what the alternative solution is to securing the session via MD5? I would *love* an alternative to the 5 days of work we've just gone through. 1) Deploy correct ingress/egress

Re: Lazy network operators

2004-04-21 Thread Kurt Erik Lindqvist
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 2004-04-18, at 04.48, Paul Jakma wrote: Well, let's be honest, name one good reason why you'd want IPv6 (given you have 4)? That's quite an assumption there. - - kurtis - -BEGIN PGP SIGNATURE- Version: PGP 8.0.3

Re: Lazy network operators

2004-04-21 Thread Kurt Erik Lindqvist
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 2004-04-18, at 01.10, Paul Jakma wrote: Hmmm, or rather, there just wont be any demand for IPv6 deployment, at least from the edges (consumers, small/medium networks). Why bother changing if, despite the (almost indefinitely) availability of

Re: why use IPv6, was: Lazy network operators

2004-04-21 Thread Kurt Erik Lindqvist
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 As co-chair of the multi6 WG : On 2004-04-19, at 02.29, william(at)elan.net wrote: Perhaps ipv6 has some dark spots that may have made upgrading not attractive at this time, but stopping work on it and continuing ipv4 for next 100 years is

RE: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Michel Py
Christopher / Patrick, Christopher L. Morrow wrote: I wasn't clear and for that I'm sorry. Except in the later code trains, or until the recent past (1 year or so) changing the BGP MD5 auth bits required the session to be reset. Then I'm the one sorry because I never got it to work (I have

Re: why use IPv6, was: Lazy network operators

2004-04-21 Thread Kurt Erik Lindqvist
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Perhaps ipv6 has some dark spots that may have made upgrading not attractive at this time, but stopping work on it and continuing ipv4 for next 100 years is not an option in my view - we just need to put more effort on things like multihoming

Re: TCP RST attack (the cause of all that MD5-o-rama)

2004-04-21 Thread Peter Galbavy
E.B. Dreger wrote: I don't think we're even that far along. If I'm reading FreeBSD 4.9 and NetBSD 1.6.2 source correctly, /usr/src/sys/netinet/in_pcb.c Should have stretched as far as OpenBSD then. Same file. tells all. AFAIK, sequential search is about it. Try a port number, verify

RE: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Christopher L. Morrow
On Tue, 20 Apr 2004, Michel Py wrote: Christopher / Patrick, Christopher L. Morrow wrote: I wasn't clear and for that I'm sorry. Except in the later code trains, or until the recent past (1 year or so) changing the BGP MD5 auth bits required the session to be reset. Then I'm the one

RE: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread David Luyer
Michael Py wrote: Christopher / Patrick, Christopher L. Morrow wrote: I wasn't clear and for that I'm sorry. Except in the later code trains, or until the recent past (1 year or so) changing the BGP MD5 auth bits required the session to be reset. Then I'm the one sorry because I

Re: TCP RST attack (the cause of all that MD5-o-rama)

2004-04-21 Thread E.B. Dreger
PG Date: Wed, 21 Apr 2004 07:45:36 +0100 PG From: Peter Galbavy PG E.B. Dreger wrote: PG I don't think we're even that far along. If I'm reading FreeBSD PG 4.9 and NetBSD 1.6.2 source correctly, PG PG /usr/src/sys/netinet/in_pcb.c PG PG Should have stretched as far as OpenBSD then. Same

RE: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Michel Py
Christopher / David, Christopher L. Morrow wrote: if you mean resetting sessions to change keys I believe it's more code dependent than anythingn else. That was my point: I thought that changing keys without resetting the session was tied to a specific version of the S train that I have

RE: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread David Luyer
Michael, David Luyer wrote: Have done around 100 of these in the past 24 hours. It's not related to platform AFAIK - we've successfully done the changes on a lowly 2651 and 3620 without outages, but a 7200 with older IOS did have an outage. Given the context, I assume that you have

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Iljitsch van Beijnum
On 21-apr-04, at 9:56, Michel Py wrote: For pure: Don't blow me up with prefixes just limit the maximum-prefix to some # over your expected peer's list. Please allow me to try to make my point again: you store the expected peer maximum-prefix somewhere in your management system. I do understand

BGP session reset in one packet [where a looking glass or route server is available]

2004-04-21 Thread David Luyer
It's not the general case, however... Some looking glass CGIs (in some cases, into production routers) permit sh ip bgp nei x -- try typing sum and then nei x.x.x.x into the show ip bgp box on a looking glass CGI, or using the command on a route server with CLI access. This gives you: Local

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Dan Hollis
On Tue, 20 Apr 2004, Rodney Joffe wrote: The only network engineer who may NOT have been aware of the building BGP vulnerability issue over the last week has to be the engineer who is currently on his annual vacation in Mauritius, and who refuses to take his Blackberry, Palm, or Satellite

snmp vuln

2004-04-21 Thread Mikael Abrahamsson
http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml This one seems much worse than the TCP RST problem. -- Mikael Abrahamssonemail: [EMAIL PROTECTED]

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread James
Wouldnt anti-spoofing filters largely eliminate the need for all this panic about MD5? egress filtering, yes... but not everyone does this and thats what poses the panic i guess :( ingress filtering... largely yes, but no? consider the scenario: someone runs traceroute to you (Joe ISP)

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Adam Rothschild
On 2004-04-20-23:09:31, David Luyer [EMAIL PROTECTED] wrote: [...] Answering another poster's concern about DoS risk... TCP MD5 is not a significant DoS risk as you only MD5 once the source, destination, sequence, etc are valid - ie. you only MD5 a packet which would already have broken your

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Iljitsch van Beijnum
On 21-apr-04, at 12:44, Adam Rothschild wrote: All things considered, I think MD5 authentication will lower the bar for attackers, not raise it. I'm sure code optimizations could fix things to some degree, but that's just not the case today. Which begs the question, what is one to do, How

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Daniel Roesen
On Wed, Apr 21, 2004 at 01:00:07PM +0200, Iljitsch van Beijnum wrote: All things considered, I think MD5 authentication will lower the bar for attackers, not raise it. I'm sure code optimizations could fix things to some degree, but that's just not the case today. Which begs the

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Iljitsch van Beijnum
On Wed, 21 Apr 2004, Daniel Roesen wrote: access-list 123 deny tcp any any eq bgp rst log-input access-list 123 deny tcp any eq bgp any rst log-input Unfortunately, not all vendors are able to look at the RST bit when filtering... The general ignorance to the fact that SYN works

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread E.B. Dreger
DH Date: Wed, 21 Apr 2004 02:01:56 -0700 (PDT) DH From: Dan Hollis DH Wouldnt anti-spoofing filters largely eliminate the need for DH all this panic about MD5? But that doesn't push the short-term cost onto other networks. Eddy -- EverQuick Internet - http://www.everquick.net/ A division of

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread E.B. Dreger
ASR Date: Wed, 21 Apr 2004 06:44:14 -0400 ASR From: Adam Rothschild ASR [T]he TTL hack sounds great on paper, but isn't exactly easy ASR to implement when you consider that vendor J and others ASR can't filter based upon TTL... yet. This is more appropriate for cisco-nsp, where it's already

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Pekka Savola
On Wed, 21 Apr 2004, E.B. Dreger wrote: DH Date: Wed, 21 Apr 2004 02:01:56 -0700 (PDT) DH From: Dan Hollis DH Wouldnt anti-spoofing filters largely eliminate the need for DH all this panic about MD5? But that doesn't push the short-term cost onto other networks. Not sure what you're

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Daniel Roesen
On Wed, Apr 21, 2004 at 01:23:54PM +0200, Iljitsch van Beijnum wrote: On Wed, 21 Apr 2004, Daniel Roesen wrote: access-list 123 deny tcp any any eq bgp rst log-input access-list 123 deny tcp any eq bgp any rst log-input Unfortunately, not all vendors are able to look at the

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread E.B. Dreger
PS Date: Wed, 21 Apr 2004 14:23:38 +0300 (EEST) PS From: Pekka Savola PS But that doesn't push the short-term cost onto other networks. PS PS Not sure what you're saying. You don't need to deploy PS anti-spoofing filters everywhere. It needs to be done by I was being sarcastic wrt networks

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Iljitsch van Beijnum
On Wed, 21 Apr 2004, Daniel Roesen wrote: The general ignorance to the fact that SYN works as well is astonishing. :-) What are you talking about? http://www.uniras.gov.uk/vuls/2004/236929/index.htm First paragraph of the summary: The issue described in this advisory is the

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Daniel Roesen
On Wed, Apr 21, 2004 at 02:10:05PM +0200, Iljitsch van Beijnum wrote: The issue described in this advisory is the practicability of resetting an established TCP connection by sending suitable TCP packets with the RST (Reset) or SYN (Synchronise) flags set. And: It is also possible to

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Iljitsch van Beijnum
On 21-apr-04, at 14:38, Daniel Roesen wrote: So the attacker sends a spoofed SYN to router A, and router A sends an RST to router B and router B terminates the BGP session. Correct. The good part here is that filtering RSTs should still work. It doesn't. The RST are then being sent by the

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Daniel Roesen
On Wed, Apr 21, 2004 at 03:09:15PM +0200, Iljitsch van Beijnum wrote: The good part here is that filtering RSTs should still work. It doesn't. The RST are then being sent by the authorized sender and your edge anti-spoof filtering for RST doesn't help a single millimeter. Now it's

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Iljitsch van Beijnum
On 21-apr-04, at 15:21, Daniel Roesen wrote: As you didn't specify where to apply these filters, I guessed on the edges. I would have never thought that someone would really suggest to deliberately break RST for valid BGP sessions. Try me. :-) But don't forget the borders, those are more

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Patrick W . Gilmore
On Apr 21, 2004, at 3:56 AM, Michel Py wrote: Christopher L. Morrow wrote: For pure: Don't blow me up with prefixes just limit the maximum-prefix to some # over your expected peer's list. Please allow me to try to make my point again: you store the expected peer maximum-prefix somewhere in your

RE: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Michel Py
Adam Rothschild wrote: Which begs the question, what is one to do, shy of moving (private) peering/transit/customer /31's and /30's into non-routable IP space, which opens up an entirely new can of worms? Insist that the peer uses ip verify unicast reverse-path on all interfaces, or similar

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Jared Mauch
On Wed, Apr 21, 2004 at 10:19:10AM -0400, Patrick W.Gilmore wrote: On Apr 21, 2004, at 3:56 AM, Michel Py wrote: Christopher L. Morrow wrote: For pure: Don't blow me up with prefixes just limit the maximum-prefix to some # over your expected peer's list. Please allow me to try to make

RE: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Michel Py
Patrick W.Gilmore wrote: And when that process involves customers calling to ask why they can't get to XXX web site (no pun intended - I'm sure no one would filter a pr0n site :), it is much more than a bitch, it is a CLM/CEM. But you're missing something fundamental here: for non-tier-1s,

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Patrick W . Gilmore
On Apr 21, 2004, at 10:38 AM, Jared Mauch wrote: On Wed, Apr 21, 2004 at 10:19:10AM -0400, Patrick W.Gilmore wrote: Yes, it generates more work to update the database, but OTOH it provides the LIII engineer with a lot more to troubleshoot issues. Is it simply not worth the work at your scale?

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Adam Rothschild
On 2004-04-21-10:35:27, Michel Py [EMAIL PROTECTED] quoted me out of order as saying: Which begs the question, what is one to do, shy of moving (private) peering/transit/customer /31's and /30's into non-routable IP space, which opens up an entirely new can of worms? Insist that the

RE: Xspedius / E.Spire as wellRe: Winstar says there is no TCP/BGP vulnerability (fwd)

2004-04-21 Thread Peering
All, Xspedius (formerly e.spire/ACSI) is in the process of converting BGP connections to MD5. We have already done so with both of our transit providers and we're working on contacting customers that we do BGP with. If anyone is a customer of Xspedius and wants to convert to MD5, please email

RE: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Peering
We do prefix-filter all our peers, both customer and transit. We also use as-path filters. It does seem to help us avoid insertion of invalid routes and other issues (especially since some people we peer with don't do the same on their side). As far as stability and process problems, we're too

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Jared Mauch
On Wed, Apr 21, 2004 at 11:11:57AM -0400, Patrick W.Gilmore wrote: On Apr 21, 2004, at 10:38 AM, Jared Mauch wrote: On Wed, Apr 21, 2004 at 10:19:10AM -0400, Patrick W.Gilmore wrote: Yes, it generates more work to update the database, but OTOH it provides the LIII engineer with a lot

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Robert E. Seastrom
Christopher L. Morrow [EMAIL PROTECTED] writes: there is the issue of changing the keys during operations without impacting the network, eh? Having to bounce every bgp session in your network can be pretty darned painful... if you change the key(s) of course. If you don't you might as well

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Todd Vierling
On Wed, 21 Apr 2004, David Luyer wrote: : You missed the (assuming the attacker can accurately guess both : ports) part. : A significant number of BGP sessions will be with a source : port of 11000, 11001 or 11002; BGP sessions are generally : quite stable and Cisco routers start the source

Re: Ad blocking with squid

2004-04-21 Thread esm
On Mon, Apr 19, 2004 at 04:33:49PM -0400, Paul Khavkine wrote: Anyone doing ad blocking with Squid cache engine out there ? This is what I've been using with Squid: http://adzapper.sourceforge.net/ -- Edward S. Marshall [EMAIL PROTECTED] http://esm.logic.net/ Felix qui potuit rerum

RE: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Michel Py
David Luyer wrote: 98 of the first 100 did not reset. Today, I did another 12 and only one failed. Thanks for the feedback. If you have a fully redundant internal BGP, and are running all 12.2S/12.3/12.2T, then you can rather safely do the internal BGP passwords without a customer notice,

RE: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Peering
If you have a fully redundant internal BGP, and are running all 12.2S/12.3/12.2T, then you can rather safely do the internal BGP passwords without a customer notice, expecting no session drop but knowing if one did you'd have routes via a second BGP reflector anyway. Just an FYI, when

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread E.B. Dreger
IvB Date: Wed, 21 Apr 2004 15:09:15 +0200 IvB From: Iljitsch van Beijnum IvB [T]he filters I listed in my earlier message simply filter IvB RSTs to/from the BGP port without looking at the address IvB fields [...] the BGP hold timer takes care of business here IvB anyway [...] Interesting

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Aditya
On Wed, 21 Apr 2004 07:35:27 -0700, Michel Py [EMAIL PROTECTED] said: Insist that the peer uses ip verify unicast reverse-path on all interfaces, or similar command for other vendors. I sure hope there are no asymmetric paths on the Internet that will bite you when you turn on strict RPF on

Re: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Christopher L. Morrow
On Wed, 21 Apr 2004, Robert E. Seastrom wrote: Christopher L. Morrow [EMAIL PROTECTED] writes: there is the issue of changing the keys during operations without impacting the network, eh? Having to bounce every bgp session in your network can be pretty darned painful... if you change

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Pete Kruckenberg
Interesting that Cisco uses random port selection with SNMP (http://www.cisco.com/warp/public/707/cisco-sa-20040420-snmp.shtml, see the Detail selection) but not with TCP. Too bad that TCP ports aren't randomized even with the fixed IOS versions. Would seem that as long as you're implementing

Re: The Uneducated Enduser (Re: Microsoft XP SP2 (was Re: Lazy network operators - NOT))

2004-04-21 Thread Chris Palmer
Doug White writes: It would be nearly impossible for computer software makers to provide against any type of attack by those so inclined. The result is that they are reactive rather than pro-active. That's not the point. The difference in degree of security between Windows and Mac OS X is

Re: TCP RST attack (the cause of all that MD5-o-rama)

2004-04-21 Thread Crist Clark
E.B. Dreger wrote: PG Date: Wed, 21 Apr 2004 07:45:36 +0100 PG From: Peter Galbavy PG E.B. Dreger wrote: PG I don't think we're even that far along. If I'm reading FreeBSD PG 4.9 and NetBSD 1.6.2 source correctly, PG PG /usr/src/sys/netinet/in_pcb.c PG PG Should have stretched as far as

Re: TCP RST attack (the cause of all that MD5-o-rama)

2004-04-21 Thread Simon Lockhart
On Tue Apr 20, 2004 at 02:54:16PM -0400, James wrote: now the question is... would this also affect single-hop bgp sessions? my understanding would be no, as single-hops require ttl set to 1. All it requires is for the TTL to be 1 (or 0, I can't remember which) when it's received. Just launch

RE: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Michel Py
Aditya wrote I sure hope there are no asymmetric paths on the Internet that will bite you when you turn on strict RPF on your peering interfaces /sarcasm Seriously, if you do turn RPF on on peering interfaces, please let your peers know (plea from circa 1999) Ah, I was waiting for someone

RE: TCP RST attack (the cause of all that MD5-o-rama)

2004-04-21 Thread Michel Py
James wrote: now the question is... would this also affect single-hop bgp sessions? my understanding would be no, as single-hops require ttl set to 1. Simon Lockhart wrote: All it requires is for the TTL to be 1 (or 0, I can't remember which) when it's received. Just launch your packets

Re: Ad blocking with squid

2004-04-21 Thread Dan Hollis
On Wed, 21 Apr 2004 [EMAIL PROTECTED] wrote: On Mon, Apr 19, 2004 at 04:33:49PM -0400, Paul Khavkine wrote: Anyone doing ad blocking with Squid cache engine out there ? This is what I've been using with Squid: http://adzapper.sourceforge.net/ Adzapper works very well, and is highly

Re: TCP RST attack (the cause of all that MD5-o-rama)

2004-04-21 Thread Paul Jakma
On Tue, 20 Apr 2004, Patrick W.Gilmore wrote: (Someone check my math. :) try not to include text after your sig. some people set their mailers to strip sigs from replies. Sequence numbers are 32 bits. Since the miscreant only needs to guess once every 14 bits, you get: 2^32 / 2^14 ==

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Paul Jakma
On Wed, 21 Apr 2004, Iljitsch van Beijnum wrote: I'm not recommending this for small peers as the crypto DoS risk is worse than what happens when the attack is executed successfully. Why would MD5 be more of a crypto DoS risk with IPSec AH headers than with bgp tcp-md5? regards, -- Paul

Re: TCP RST attack (the cause of all that MD5-o-rama)

2004-04-21 Thread Patrick W . Gilmore
On Apr 21, 2004, at 3:14 PM, Paul Jakma wrote: On Tue, 20 Apr 2004, Patrick W.Gilmore wrote: try not to include text after your sig. some people set their mailers to strip sigs from replies. Wasn't that important. [...] Which is only 28 hours at 10kpps: 1042284544/(10*1000)/3600 = 28.95234

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Iljitsch van Beijnum
On 21-apr-04, at 21:17, Paul Jakma wrote: I'm not recommending this for small peers as the crypto DoS risk is worse than what happens when the attack is executed successfully. Why would MD5 be more of a crypto DoS risk with IPSec AH headers than with bgp tcp-md5? Beats me. But why do you bring

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread Paul Jakma
On Wed, 21 Apr 2004, Iljitsch van Beijnum wrote: On 21-apr-04, at 21:17, Paul Jakma wrote: I'm not recommending this for small peers as the crypto DoS risk is worse than what happens when the attack is executed successfully. Why would MD5 be more of a crypto DoS risk with IPSec

Cisco Rolls Major Patches to TCP Flaw

2004-04-21 Thread Henry Linneweh
http://www.internetnews.com/infra/article.php/3343561 For people still in a panic -Henry

Re: Vendor TCP oops-es (was Re: TCP/BGP vulnerability)

2004-04-21 Thread Iljitsch van Beijnum
On 21-apr-04, at 21:18, Todd Vierling wrote: [*] I must admit one thing, for instance: This Advisory was a problem for NetBSD, but not because its port allocation scheme was crappy. It so happened that NetBSD wasn't properly validating the sequence number to be within the window. Oops. You

Re: Xspedius / E.Spire as wellRe: Winstar says there is no TCP/BGP vulnerability

2004-04-21 Thread Charles Sprickman
On Tue, 20 Apr 2004, John Brown (CV) wrote: On the other hand, SPRINT was willing and able to take MD5 session info right away. WAY TO GO SPRINT. Just to add my $0.02, I had very quick responses from HE.net; they called me about 5 minutes after I emailed noc@ and we both recorded then

RE: tcp bgp vulnerability looking glass and route server issues.

2004-04-21 Thread Lane Patterson
While I agree that publicly open route-views routers should not allow display of sho ip bgp nei information, this is only giving away 4-tuple info regarding non-production BGP sessions, right? So folks could potentially flap the route-views sessions, but this will not affect any production

RE: tcp bgp vulnerability looking glass and route server issues.

2004-04-21 Thread Burton, Chris
Although show ip bgp nei command is by far the easiest way to get the BGP peer information and should not be enabled on any production BGP peering routers that allow non-trusted or public connectivity it is not the only way to get the information; anyone who does not do inbound SNMP

RE: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread David Luyer
Paul Jakma wrote: On Wed, 21 Apr 2004, Iljitsch van Beijnum wrote: On 21-apr-04, at 21:17, Paul Jakma wrote: I'm not recommending this for small peers as the crypto DoS risk is worse than what happens when the attack is executed successfully. Why would MD5 be more of a

RE: tcp bgp vulnerability looking glass and route server issues.

2004-04-21 Thread David Luyer
Lane Patterson wrote: While I agree that publicly open route-views routers should not allow display of sho ip bgp nei information, this is only giving away 4-tuple info regarding non-production BGP sessions, right? So folks could potentially flap the route-views sessions, but this will not

Re: Cisco Rolls Major Patches to TCP Flaw

2004-04-21 Thread Jeff Workman
--On Wednesday, April 21, 2004 3:55 PM -0700 Henry Linneweh [EMAIL PROTECTED] wrote: http://www.internetnews.com/infra/article.php/3343561 For people still in a panic Does anybody have a tinfoil hat I can borrow so that I may join in the festivities? -J -- Jeff Workman | [EMAIL PROTECTED]

Next Joint Meeting With ARIM

2004-04-21 Thread Susan Harris
ARIN and NANOG are very pleased to announce our third joint meeting, to be held this fall in Reston, VA. NANOG meets Mon.-Wed., Oct. 17-19, and ARIN Wed.-Fri., Oct. 20-22. Plan to join us - it's a great opportunity to help determine IP allocation policy for U.S. networks. ARIN is truly a

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread John Kristoff
On Wed, 21 Apr 2004 21:00:55 +0100 (IST) Paul Jakma [EMAIL PROTECTED] wrote: risk of crypto DoS than compared to the simple BGP TCP MD5 hack. The risk is due to MD5, not IPSec :). I would say the risk is due to implementation. If the vendor's gear vomits quicker due to a resource

Re: TCP/BGP vulnerability - easier than you think

2004-04-21 Thread E.B. Dreger
JK Date: Wed, 21 Apr 2004 20:51:23 -0500 JK From: John Kristoff JK I would say the risk is due to implementation. If the JK vendor's gear vomits quicker due to a resource consumption JK issue in handling MD5, is this really a problem with MD5? Theoretically MD5 and IPSec sound great.

Re: tcp bgp vulnerability looking glass and route server issues.

2004-04-21 Thread Troy Davis
On Wed, Apr 21, 2004 at 04:21:51PM -0700, Lane Patterson [EMAIL PROTECTED] wrote: While I agree that publicly open route-views routers should not allow display of sho ip bgp nei information, this is only giving away 4-tuple info regarding non-production BGP sessions, right? So folks could

asymmetric/peer RPF [RE: TCP/BGP vulnerability - easier than you think]

2004-04-21 Thread Pekka Savola
On Wed, 21 Apr 2004, Michel Py wrote: Aditya wrote I sure hope there are no asymmetric paths on the Internet that will bite you when you turn on strict RPF on your peering interfaces /sarcasm Seriously, if you do turn RPF on on peering interfaces, please let your peers know (plea from