Date: Wed, 17 Jul 1996 11:39:36 +0300 (EET DST) From: Petri Helenius <pete@sms.fi> To: Will Brown <ewb@zns.net> Cc: freebsd-security@freebsd.org Subject: routing security? Message-ID: <199607170839.LAA03606@silver.sms.fi> In-Reply-To: <199607041418.KAA00137@selway.i.com> References: <199607041418.KAA00137@selway.i.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Will Brown writes: > Seems to me that routing protocols such as RIP, OSPF, BGP, etc. would > be juicy targets for attack, yet I have never heard of any such attacks > or vulnerability - as though they are somehow immune, or have been > overlooked, or I have me head in sand. > BGP is hardest of these since it's connection oriented and spoofing that is pretty close to impossible. Sending fake RIP entries is trivial, OSPF (when run without authentication) is doable but not easy. > Yes I are hackere loking to you tell me how to cwack your systemes > in fun new way :) > If you are concerned with routing security, run your routing protocols with authentication enabled. This specially stands true for your IGP. (for which OSPF is a good choice) Pete
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199607170839.LAA03606>