From owner-freebsd-security@FreeBSD.ORG Tue Apr 20 17:03:00 2004 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 60A1B16A4CE for ; Tue, 20 Apr 2004 17:03:00 -0700 (PDT) Received: from arginine.spc.org (arginine.spc.org [195.206.69.236]) by mx1.FreeBSD.org (Postfix) with ESMTP id 28E9443D54 for ; Tue, 20 Apr 2004 17:03:00 -0700 (PDT) (envelope-from bms@spc.org) Received: from localhost (localhost [127.0.0.1]) by arginine.spc.org (Postfix) with ESMTP id 3F4A06542C; Wed, 21 Apr 2004 01:02:59 +0100 (BST) Received: from arginine.spc.org ([127.0.0.1]) by localhost (arginine.spc.org [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 16620-01-2; Wed, 21 Apr 2004 01:02:58 +0100 (BST) Received: from empiric.dek.spc.org (82-147-17-88.dsl.uk.rapidplay.com [82.147.17.88]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by arginine.spc.org (Postfix) with ESMTP id 4A5C7653E8; Wed, 21 Apr 2004 01:02:58 +0100 (BST) Received: by empiric.dek.spc.org (Postfix, from userid 1001) id 80C3B60EE; Wed, 21 Apr 2004 01:02:54 +0100 (BST) Date: Wed, 21 Apr 2004 01:02:54 +0100 From: Bruce M Simpson To: Matthew Dillon Message-ID: <20040421000254.GK724@empiric.dek.spc.org> Mail-Followup-To: Matthew Dillon , Charles Swiger , freebsd-security@freebsd.org References: <6.0.3.0.0.20040420125557.06b10d48@209.112.4.2> <593EE0FE-9309-11D8-A8CA-003065ABFD92@mac.com> <200404202045.i3KKjKSb090656@apollo.backplane.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <200404202045.i3KKjKSb090656@apollo.backplane.com> cc: freebsd-security@freebsd.org Subject: Re: TCP RST attack X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Apr 2004 00:03:00 -0000 On Tue, Apr 20, 2004 at 01:45:20PM -0700, Matthew Dillon wrote: > 99.9% of all BGP links are direct connections (meaning that they > terminate at a router rather then pass through one). No packet to > or from port 179 has any business being routed from one network to > another in virtually all BGP link setups so the fix is utterly trivial. This isn't necessarily the case with eBGP multihop or route-server based setups. Regards, BMS