Matthew Petach via NANOG wrote on 06/10/2025 22:23:
While this is an interesting demonstration of something we've all had a
gut-level
understanding probably takes place all the time due to inconsistent policies and
unintentional overlooking of implementation details between peers, there are
simpler ways to attack the DFZ core with more devastating impact.
more to the point, the moment you implement both filtering and
propagation of subnets in a routing protocol which allows next-hop
resolution, you can no longer deterministically defend against this
entire class of threats. This is well known, e.g. connecting up a GRE
VPN and inserting the NH of the endpoint into the tunnel. Or being
careless with prefix redistribution between routing protocols and
finding out that it's very easy to shoot yourself in the foot. Hopefully
most network engineers have done this accidentally in their lives so
that they learn to be aware of it as something that can happen.
Obviously the singe marks on my fingers are from ... other things and
definitely none of the above (looks at floor awkwardly).
Anyway, the principle of all these things is the same: oscillatory
invalidation of the next-hop ip address.
The amount of sleep I'd be losing worrying about this is negligible.
Indeed.
On a separate issue, it's frustrating when people see the need to brand
their discoveries with breathless names and often (not in this case)
cutesy logos. What makes a vulnerability relevant is the product of its
exploitability and its impact. I'd rate this one as being worth having
router high-CPU triggers on the NMS and possibly churn counters, but not
much more.
Nick
_______________________________________________
NANOG mailing list
https://lists.nanog.org/archives/list/[email protected]/message/R5VNCBYOLRVU6DIJPQ7ZZDY2VRA3WO6T/