I believe we turned bgp-error-tolerance on after this Vulnerability Note from 
CERT:  https://www.kb.cert.org/vuls/id/347067

Rereading it, that sounds like what everyone is reporting here, or at least 
extremely similar.


John Stitt

________________________________
From: Niels den Otter via NANOG <nanog@lists.nanog.org>
Sent: Tuesday, May 20, 2025 8:39 AM
To: nanog@lists.nanog.org <nanog@lists.nanog.org>
Cc: Niels den Otter <niels.denot...@surf.nl>
Subject: Re: BGP malformed update/attribute list

Hello Simon,

We have seen the same in our network (was a BGP update for a specific /40 (!) 
IPv4 prefix as far as we can see).

In Juniper speak 'bgp-error-tolerance' keeps the BGP sessions up, but 
downstream networks might still suffer from this.


Regards,

Niels
_______________________________________________
NANOG mailing list
https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.nanog.org%2Farchives%2Flist%2Fnanog%40lists.nanog.org%2Fmessage%2FCDMNBBMC54JZZZOXNL7A26Q27BVTQMFO%2F&data=05%7C02%7Cjstitt%40hop-electric.com%7Cd8603c209d2640b57fc308dd97a524f0%7C7707c291b2534ee2bcd6557cdf0fea43%7C0%7C0%7C638833457754493208%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=1%2F1SMJ7qEbo0tmCCn66OyeRLYzNhWhf25YnPp3WhpGc%3D&reserved=0<https://lists.nanog.org/archives/list/nanog@lists.nanog.org/message/CDMNBBMC54JZZZOXNL7A26Q27BVTQMFO/>

CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you recognize the sender and know the content 
is safe. If you are not expecting this message contact the sender directly via 
phone/text to verify.

_______________________________________________
NANOG mailing list 
https://lists.nanog.org/archives/list/nanog@lists.nanog.org/message/6YP2BVWF7U7HXCW7RNN6XR7KPBRJBQH5/

Reply via email to