It came up 2 or 3 years ago I seem to remember. ACLs to verify the BGP endpoints are a good first line of defense. Cisco came up with a feature that seems to help as well, see below. Some people are for MD5, some feel it has no value...
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gt_btsh.html Chuck -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of John Brown Sent: Friday, September 14, 2012 4:00 PM To: [email protected] Subject: [c-nsp] BGP MD5 DDOS ? Hi Folks, I remember reading / hearing that using a BGP password could cause a DDOS vulnerability with Cisco and other vendor devices. Any words of wisdom here ?? Thanks _______________________________________________ cisco-nsp mailing list [email protected] https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/ _______________________________________________ cisco-nsp mailing list [email protected] https://puck.nether.net/mailman/listinfo/cisco-nsp archive at http://puck.nether.net/pipermail/cisco-nsp/
