North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: BGP Exploit

  • From: Mark Johnson
  • Date: Thu May 13 07:35:16 2004

Hi,

> > What if sessions were attacked without MD5 in place. We 
> would just see
> > session resets. As these happen anyway frequently at 
> peering points is 
> > there
> > any straightforward way to determine if the vulnerability 
> caused the 
> > reset?
> 
> If you're referring to session resets because of a peer or user
> action then something akin to "Last reset due to FOO" can likely
> be gleaned from "show bgp neighbor" output, especially since BGP
> performs "graceful shutdown" via notification messages under normal
> conditions

I think what I'm trying to ask is:

1. Does anyone know if the exploit is actually being used? and
2. I assume there is no way to identify an exploit reset from the usual
resets caused by routers hanging, ports failing, DDoS's, etc. However, I
thought I'd ask...

Kind regards,

Mark