BGP Exploit

Mark Johnson mark at avensys.net
Thu May 13 11:31:08 UTC 2004


Hi,

> > What if sessions were attacked without MD5 in place. We 
> would just see
> > session resets. As these happen anyway frequently at 
> peering points is 
> > there
> > any straightforward way to determine if the vulnerability 
> caused the 
> > reset?
> 
> If you're referring to session resets because of a peer or user
> action then something akin to "Last reset due to FOO" can likely
> be gleaned from "show bgp neighbor" output, especially since BGP
> performs "graceful shutdown" via notification messages under normal
> conditions

I think what I'm trying to ask is:

1. Does anyone know if the exploit is actually being used? and
2. I assume there is no way to identify an exploit reset from the usual
resets caused by routers hanging, ports failing, DDoS's, etc. However, I
thought I'd ask...

Kind regards,

Mark



More information about the NANOG mailing list