nanog mailing list archives

Re: Winstar says there is no TCP/BGP vulnerability


From: "E.B. Dreger" <eddy+public+spam () noc everquick net>
Date: Thu, 22 Apr 2004 21:59:52 +0000 (GMT)


RT> Date: Tue, 20 Apr 2004 23:11:28 -0500 (CDT)
RT> From: Rob Thomas


RT> We manage well over 150 peering sessions with MD5 passwords
RT> in place.  This includes bogon peering, route-server peering,

CYMRU bogon (et al.) route servers are an example of where MD5 or
IPSec definitely is a good idea.  However, most peer/peer and
carrier/downstream BGP sessions aren't multihop spanning a
network or three.

Of course, if ingress SAV were universal...


Eddy
--
EverQuick Internet - http://www.everquick.net/
A division of Brotsman & Dreger, Inc. - http://www.brotsman.com/
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]national
Phone: +1 316 794 8922 Wichita
_________________________________________________________________
          DO NOT send mail to the following addresses :
  blacklist () brics com -or- alfra () intc net -or- curbjmp () intc net
Sending mail to spambait addresses is a great way to get blocked.


Current thread: