TCP/BGP vulnerability - easier than you think

Adam Rothschild asr+nanog at latency.net
Wed Apr 21 15:13:26 UTC 2004


On 2004-04-21-10:35:27, Michel Py <michel at arneill-py.sacramento.ca.us>
quoted me out of order as saying:
> > Which begs the question, what is one to do, shy of
> > moving (private) peering/transit/customer /31's and
> > /30's into non-routable IP space, which opens up an
> > entirely new can of worms?
> 
> Insist that the peer uses "ip verify unicast reverse-path" on all
> interfaces, or similar command for other vendors.

Not a bad idea in general, where practical, but not necessarily a fix
for the problem at hand.

We tested hitting a Cisco box w/ ebgp-multihop configured with MD5/BGP
packets sourced from a random host not configured as a peer, and the
results weren't exactly pretty.  I consider this test to be of at
least some real-world relevance, as there are transit providers who
will put customers on one L3 customer-attach device, and have them
multihop-peer with another router further upstream.

Of course, only allowing tcp/179 from configured peers is a good idea.
But unless you've got something that allows you to easily filter
traffic to a router's interface IP's, such as Juniper with loopback
filtering, or Cisco 7500/12000 with receive path ACL's, or you have an
army of tools developers on salary, maintaining the requisite
access-lists can be an administrative burden.

(IMO, Cisco implementing rACL-like functionality on lesser routers
would be a step in the right direction.  But I've been of this opinion
for a while now, long before this particular vulnerability came to
light...)

-a



More information about the NANOG mailing list