SYN spoofing and Ciscos crashing
jlewis at lewis.org
jlewis at lewis.org
Wed Jul 28 20:42:17 UTC 1999
On Wed, 28 Jul 1999, bryan s. blank wrote:
>
> % ip verify unicast reverse-path
> %
> % and according to Paul Ferguson (co-author of RFC 2267) it's in use by
> % many ISPs. Apparently this is very-low overhead. Paul has also indicated
> % the use of extended access lists on Cisco routers is very low overhead,
> % especially on routers using distributed express forwarding.
>
> while i hate to question mr. ferguson, it's my understanding
> that many isps have found this feature to be unusable due to
> network design.
I just took out a 7206 by applying ip verify unicast reverse-path to a T3
link on a PA2T3 and attempting to spoof packets from the POP on the other
end of that T3.
The 7206 is running c7200-inu-mz.111-25.CC. Fortunately, it rebooted
after it crashed.
System restarted by bus error at PC 0x605F88CC, address 0x10024 at
20:29:49 UTC Wed Jul 28 1999
This router had been up over 8 weeks without a crash (ever since Cisco
replaced the previous 7206 in this POP that was either posessed or a
lemon). The memory is Cisco memory. All the parts came directly from
Cisco.
Is this known to be unstable in 111-25.CC? Is it known to be stable in
some other release that supports the PAT3, PA2T3, and PA-MCT3?
----don't waste your cpu, crack rc5...www.distributed.net team enzo---
Jon Lewis *jlewis at lewis.org*| Spammers will be winnuked or
System Administrator | nestea'd...whatever it takes
Atlantic Net | to get the job done.
_________http://www.lewis.org/~jlewis/pgp for PGP public key__________
More information about the NANOG
mailing list