Re: BGP Security Research Question

2014-11-04 Thread Roland Dobbins
On 5 Nov 2014, at 0:17, valdis.kletni...@vt.edu wrote: > Am I the only guy wondering how many boxes out there are *still* > vulnerable to forged RST packets? That's covered by ' . . . and the like . . . ' ;> --- Roland Dobbins

Re: BGP Security Research Question

2014-11-04 Thread Valdis . Kletnieks
On Tue, 04 Nov 2014 18:02:47 +0700, "Roland Dobbins" said: > Networks which haven't implemented the BCPs sometimes find their BGP > peering sessions disrupted via DDoS attacks against the routers > themselves; SYN-floods and the like against TCP/179 are sometimes used > to disrupt BGP sessions i

Re: BGP Security Research Question

2014-11-04 Thread sthaug
> Let me disagree - Pakistan Youtube was possible only because their uplink > provider did NOT implement inbound route filters . As always the weakest > link is human factor - and no super-duper newest technology is ever to help > here . Agreed, the uplink absolutely should have implemented prefix

Re: BGP Security Research Question

2014-11-04 Thread Sandra Murphy
On Nov 4, 2014, at 8:45 AM, Yuri Slobodyanyuk wrote: > Let me disagree - Pakistan Youtube was possible only because their uplink > provider did NOT implement inbound route filters . As always the weakest > link is human factor - and no super-duper newest technology is ever to help > here . One

RE: BGP Security Research Question

2014-11-04 Thread Russ White
> Authorization is global. (And so it relies on global access to a statement of > the authorization, aye, there's the rub.) The real rub is -- What are you authorizing? Or perhaps -- what can you actually authorize in BGP, or any other routing protocol? This is the question that (as of yet) ha

Re: BGP Security Research Question

2014-11-04 Thread Yuri Slobodyanyuk
Let me disagree - Pakistan Youtube was possible only because their uplink provider did NOT implement inbound route filters . As always the weakest link is human factor - and no super-duper newest technology is ever to help here . As regards to S-bgp/soBGP from technical point of view , wait for the

RE: BGP Security Research Question

2014-11-04 Thread Darden, Patrick
ERNAL]BGP Security Research Question I'm a student in college learning about networking and, specifically, BGP. Does anyone have any statistics on the use of S-BGP or soBGP in the wild? I've read a few papers / RFCs on the subject (from Cisco and the like), but I haven't been able to

Re: BGP Security Research Question

2014-11-04 Thread Sandra Murphy
On Nov 4, 2014, at 8:00 AM, Nick Hilliard wrote: > On 04/11/2014 12:38, sth...@nethelp.no wrote: >> These mechanisms do little or nothing to protect against unauthorized >> origination of routing information. There are plenty of examples which >> say it has *not* been enough, see for instance th

Re: BGP Security Research Question

2014-11-04 Thread Nick Hilliard
On 04/11/2014 12:38, sth...@nethelp.no wrote: > These mechanisms do little or nothing to protect against unauthorized > origination of routing information. There are plenty of examples which > say it has *not* been enough, see for instance the Pakistan Telecom - > Youtube incident in 2008. mis-ori

Re: BGP Security Research Question

2014-11-04 Thread sthaug
> In real life people use - bgp ttl security, md5 passwords, control plane > protection of 179 port, inbound/outbound routes filters. So far this has > been enough. These mechanisms do little or nothing to protect against unauthorized origination of routing information. There are plenty of example

Re: BGP Security Research Question

2014-11-04 Thread Yuri Slobodyanyuk
Having seen few hundreds BGP peerings with internal clients as well as with uplink providers cannot recall anyone ever even trying to use such features. And given that both were created back in late 90s early 2000s we can safely assume these technologies (S-BGP/soBGP) will stay just that - blue-sky

Re: BGP Security Research Question

2014-11-04 Thread Roland Dobbins
On 4 Nov 2014, at 10:57, Anthony Weems wrote: I'm a student in college learning about networking and, specifically, BGP. Does anyone have any statistics on the use of S-BGP or soBGP in the wild? Take a look at rPKI. Additionally, do people scan BGP speakers in the same sense that researche

BGP Security Research Question

2014-11-04 Thread Anthony Weems
I'm a student in college learning about networking and, specifically, BGP. Does anyone have any statistics on the use of S-BGP or soBGP in the wild? I've read a few papers / RFCs on the subject (from Cisco and the like), but I haven't been able to find any information about actual usage. Additiona