Re: tcp md5 bgp attacks?

2018-08-20 Thread Garrett Skjelstad
gy of all." > > -Original Message- > From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Randy Bush > Sent: Tuesday, August 14, 2018 3:39 PM > To: North American Network Operators' Group > Subject: tcp md5 bgp attacks? > > so we started to wonder if, since w

Re: tcp md5 bgp attacks?

2018-08-19 Thread Niels Bakker
* ra...@psg.com (Randy Bush) [Wed 15 Aug 2018, 04:27 CEST]: my memory is that seq num guessing and sending rst was the core problem motivating tcp/md5 for bgp, and btsh came some years later. but no big deal. And a few looking glasses exposed detailed TCP window information when run against

Re: tcp md5 bgp attacks?

2018-08-15 Thread lobna gouda
sec and GTSM... Brgds, LG From: NANOG on behalf of Randy Bush Sent: Tuesday, August 14, 2018 5:38 PM To: North American Network Operators' Group Subject: tcp md5 bgp attacks? so we started to wonder if, since we started protecting our bgp sessions with md5 (

Re: tcp md5 bgp attacks?

2018-08-15 Thread Randy Bush
> With regards to BGP, the MD5 thing was promulgated to counter what was > a largely theoretical threat. the rst attacks were a very serious problem. attacks were very real and very disruptive. gtsm et alia were a few years later. > We still see DDoS attacks against routers, of course. i am

Re: tcp md5 bgp attacks?

2018-08-15 Thread Fred Baker
Well, think about RST attacks, in which someone bombards a TCP connection with TCP RESET in the hopes of threading a needle and taking it down. It's not the end of the world - BGP restarts - but there is an outage. The simplest way to protect against that (and against having someone with a

RE: tcp md5 bgp attacks?

2018-08-15 Thread Lotia, Pratik M
h American Network Operators' Group Subject: tcp md5 bgp attacks? so we started to wonder if, since we started protecting our bgp sessions with md5 (in the 1990s), are there still folk trying to attack? we were unable to find bgp mib counters. there are igp interface counters, but that was not our

Re: tcp md5 bgp attacks?

2018-08-14 Thread joel jaeggli
On 8/14/18 7:27 PM, Randy Bush wrote: > > < rathole > > i am not much worried about a mesh which floods unicast. can you even > buy devices which support that any more? a while back, i had to really > dig in the closet to find one at 100mbps so i could shark mid-stream. I'm not actually

Re: tcp md5 bgp attacks?

2018-08-14 Thread Roland Dobbins
On 15 Aug 2018, at 9:27, Randy Bush wrote: my theory is that, as the attacks were mitigated the attackers moved on to other things. With regards to BGP, the MD5 thing was promulgated to counter what was a largely theoretical threat. iACLs, and later GTSM and CoPP and LPTS and so forth

Re: tcp md5 bgp attacks?

2018-08-14 Thread Randy Bush
my memory is that seq num guessing and sending rst was the core problem motivating tcp/md5 for bgp, and btsh came some years later. but no big deal. i think that, indeed, md5 keys are shared across many links *within* an op's infrastructure. but, since integrity, and not privacy, is the goal,

Re: tcp md5 bgp attacks?

2018-08-14 Thread joel jaeggli
On 8/14/18 2:38 PM, Randy Bush wrote: > so we started to wonder if, since we started protecting our bgp > sessions with md5 (in the 1990s), are there still folk trying to > attack? To recap for the purpose of my own edification and because hopefully someone will relieve me of my assumptions.

Re: tcp md5 bgp attacks?

2018-08-14 Thread Randy Bush
>> something such as, or close to, rfc 4808? > > It provides some capability, but for example if I have a large iBGP > mesh and need to change methods of securing it and have automation > involved, it can often be a one-shot change unless I can zone some > routers to different versions of

Re: tcp md5 bgp attacks?

2018-08-14 Thread Jared Mauch
> On Aug 14, 2018, at 8:12 PM, Randy Bush wrote: > > [ again, thanks for an answer to the question asked ] > >>> anyone using the timed key-chain stuff? >> >> I’ve looked at it, hear it works, but not been willing to take the hit >> for any transition. > > and i am not sure it meets my

Re: tcp md5 bgp attacks?

2018-08-14 Thread Randy Bush
[ again, thanks for an answer to the question asked ] >> anyone using the timed key-chain stuff? > > I’ve looked at it, hear it works, but not been willing to take the hit > for any transition. and i am not sure it meets my needs. i am not seeking privacy or pfs. i want roll-if-compromise.

Re: tcp md5 bgp attacks?

2018-08-14 Thread Jared Mauch
> On Aug 14, 2018, at 8:04 PM, Randy Bush wrote: > > follow-on question: > > anyone using the timed key-chain stuff? I’ve looked at it, hear it works, but not been willing to take the hit for any transition. I talked about some of this and other challenges at SAAG WG at IETF 101.

Re: tcp md5 bgp attacks?

2018-08-14 Thread Randy Bush
> My data is coarse, but with 'show system statistics tcp | match auth' > I see sometimes thousands of rcv packets dropped on BGP routers. I > doubt they are attacks, but simply badly configured or stale peer > sessions over the course of time the counters initialized from. thanks john for the

Re: tcp md5 bgp attacks?

2018-08-14 Thread John Kristoff
On Tue, 14 Aug 2018 21:38:35 + Randy Bush wrote: > we would be interested in data from others. My data is coarse, but with 'show system statistics tcp | match auth' I see sometimes thousands of rcv packets dropped on BGP routers. I doubt they are attacks, but simply badly configured or

Re: tcp md5 bgp attacks?

2018-08-14 Thread Roland Dobbins
On 15 Aug 2018, at 6:28, Grant Taylor via NANOG wrote: > Is there something that I've missed the boat on? No - it's a belt-and-suspenders sort of thing, along with GTSM. --- Roland Dobbins

Re: tcp md5 bgp attacks?

2018-08-14 Thread Job Snijders
On Tue, Aug 14, 2018 at 05:28:13PM -0600, Grant Taylor via NANOG wrote: > On 08/14/2018 03:38 PM, Randy Bush wrote: > > so we started to wonder if, since we started protecting our bgp > > sessions with md5 (in the 1990s), are there still folk trying to > > attack? > > n00b response here > > I

Re: tcp md5 bgp attacks?

2018-08-14 Thread Grant Taylor via NANOG
On 08/14/2018 03:38 PM, Randy Bush wrote: so we started to wonder if, since we started protecting our bgp sessions with md5 (in the 1990s), are there still folk trying to attack? n00b response here I thought using ACLs or otherwise protecting the BGP endpoint was best practice. Thus it's

tcp md5 bgp attacks?

2018-08-14 Thread Randy Bush
so we started to wonder if, since we started protecting our bgp sessions with md5 (in the 1990s), are there still folk trying to attack? we were unable to find bgp mib counters. there are igp interface counters, but that was not our immediate interest. we did find that md5 failures are logged.