Fredy Kuenzler wrote:
> 
> Andre Oppermann wrote:
> > Is it a problem in BGP standard itself or a problem of the currently
> > available implementations from the vendors?  What is the effect of
> > the hole, will it make sessions flap or does it allow to inject bogus
> > routing information into BGP?
> 
> Noone obviously seems to know yet, except some people of Cisco, Juniper
> etc. I just can quote again the following:

Ok, have got some more information.  It's simply a bug in Cisco's TCP
implementation.  It is not a bug or problem in BGP in any way, it's
only affected because it works over TCP.

The Juniper M-Series and all others with a real operating system (Linux/
FreeBSD with Zebra/Quagga) are not affected by this.

If you are running Cisco IOS and speak BGP you should upgrade to the
most up to date IOS.  Cisco made new revisions available of almost all
IOS trains just last week.  

The MD5 frenzy was simply a work-around to a Cisco IOS bug.

-- 
Andre
----------------------------------------------
[EMAIL PROTECTED] Maillist-Archive:
http://www.mail-archive.com/swinog%40swinog.ch/

Reply via email to