On Tue, 04 Nov 2014 18:02:47 +0700, "Roland Dobbins" said:

> Networks which haven't implemented the BCPs sometimes find their BGP
> peering sessions disrupted via DDoS attacks against the routers
> themselves;   SYN-floods and the like against TCP/179 are sometimes used
> to disrupt BGP sessions in such scenarios, for example.  Aggressive
> scanning per the above against BGP speakers which haven't implemented
> the BCPs could result in inadvertent disruption of BGP sessions.

Am I the only guy wondering how many boxes out there are *still*
vulnerable to forged RST packets?

Attachment: pgpfaSMyNDR_J.pgp
Description: PGP signature

Reply via email to