[EMAIL PROTECTED] wrote:
Do malicious BGP tables mess up just *your* domains or all domains/routers on
'Net? If just *your* router then BGP is *not* a threat to *entire*
Net.

BGP tables propagate out as far as they can go.

I'm skeptical malicious BGP tables could mess up all domains cuz by
now someone would have done this & it hasn't happened!

router bgp {my numbers}
 bgp log-neighbor-changes
 network 64.162.99.0 mask 255.255.255.0
 network 64.164.164.0 mask 255.255.255.0
 network 209.79.28.0 mask 255.255.254.0
 neighbor 64.160.139.X remote-as {their numbers}
 neighbor 64.160.139.X description ** Peer with SBC **
 neighbor 64.160.139.X version 4
 neighbor 64.160.139.X soft-reconfiguration inbound
 neighbor 64.160.139.X password 7 {you don't get this}
 neighbor 64.160.139.X filter-list 2 out
 no auto-summary


This configuration shows that I actively advertize 64.162.99.0/24, 64.164.164.0/24, and 209.79.28.0/23 for a total of about 1024 IP addresses (not all of them usable). Imagine if I began advertizing, say, 24.0.0.0/8 (around 16777216 addresses)? Everyone on a cable modem would suddenly find their packets routed through a half-channel DS3 in Irvine. Traffic would grind to a halt as the DS3 would saturate both up and down in a matter of minutes. Imagine if I did the same for most of the major residential ISPs in the country.

On the other hand, fortunately most ISPs are on top of this, so the damage would be rectified rather quickly as they'd simply change my peering to read-only, drop the bad route, and perhaps even shut off my circuit if the damage was bad enough. I'd also get seven phone calls in the span of 10 minutes telling me I seriously screwed the pooch with my routing tables. This doesn't even count the snarling from angry customers wondering why their systems are inaccessable ...


anyhow, back to work for me.
-kelsey


--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to