From owner-freebsd-security Thu Jul 4 07:18:37 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id HAA28379 for security-outgoing; Thu, 4 Jul 1996 07:18:37 -0700 (PDT) Received: from ns1.zygaena.com (ns1.zygaena.com [206.148.80.3]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id HAA28373 for ; Thu, 4 Jul 1996 07:18:34 -0700 (PDT) Received: (from nobody@localhost) by ns1.zygaena.com (8.7.5/8.7.3) id KAA06182 for ; Thu, 4 Jul 1996 10:18:35 -0400 (EDT) X-Authentication-Warning: ns1.zygaena.com: nobody set sender to using -f Received: from selway.i.com(198.30.169.1) by ns1.zygaena.com via smap (V1.3) id sma006180; Thu Jul 4 10:18:32 1996 Received: (from ewb@localhost) by selway.i.com (8.7.3/8.7.3) id KAA00137 for freebsd-security@freebsd.org; Thu, 4 Jul 1996 10:18:28 -0400 (EDT) Date: Thu, 4 Jul 1996 10:18:28 -0400 (EDT) From: Will Brown Message-Id: <199607041418.KAA00137@selway.i.com> To: freebsd-security@freebsd.org Subject: routing security? Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Seems to me that routing protocols such as RIP, OSPF, BGP, etc. would be juicy targets for attack, yet I have never heard of any such attacks or vulnerability - as though they are somehow immune, or have been overlooked, or I have me head in sand. Yes I are hackere loking to you tell me how to cwack your systemes in fun new way :) just kidding (sure, sure:) but any comments on this question would be welcomed, as I want to look into getting beyond using static routes - without compromise. ------------------------============================----------------------- Will Brown ewb@zns.net Professional Web Design Zygaena Network Services http://www.zns.net and Hosting 216-381-6019 (voice) 216-381-6064 (fax) at reasonable prices