nanog mailing list archives
Best Current Practices for Routing Protocol Security
From: Sean Donelan <sean () donelan com>
Date: Wed, 14 Aug 2002 13:23:01 -0400 (EDT)
What are the best current practices ISPs use to maintain routing protocol security? 1. None - May be acceptable in some environments 2. I don't tell anyone about my routing protocols 3. Firewalls protect me 4. Don't exchange routing information with external parties 5. Explicit routing neighbor assocations - passive-interface default 6. Address validation on all edge devices 7. Signed routing messages - MD5 or something else 8. Non-routed routing infrastructure - RFC1918 for core 9. Non-IP routing protocols - ISIS 10. Out-of-band route servers - SS7 here we come
Current thread:
- Routing Protocol Security Jeff Doyle (Aug 13)
- Re: Routing Protocol Security senthil ayyasamy (Aug 13)
- Re: Routing Protocol Security dylan (Aug 13)
- Re: Routing Protocol Security batz (Aug 13)
- Re: Routing Protocol Security Hank Nussbacher (Aug 13)
- Re: Routing Protocol Security dylan (Aug 13)
- Re: Routing Protocol Security senthil ayyasamy (Aug 13)
- Best Current Practices for Routing Protocol Security Sean Donelan (Aug 14)
- Re: Best Current Practices for Routing Protocol Security John Kristoff (Aug 14)
- Re: Best Current Practices for Routing Protocol Security dylan (Aug 14)
- Re: Best Current Practices for Routing Protocol Security Stephen J. Wilcox (Aug 14)
- Re: Best Current Practices for Routing Protocol Security John Kristoff (Aug 14)
- <Possible follow-ups>
- Re: Routing Protocol Security Danny McPherson (Aug 13)