nanog mailing list archives
Re: Cisco vulnerability and dangerous filtering techniques
From: Scott McGrath <mcgrath () fas harvard edu>
Date: Wed, 23 Jul 2003 12:32:25 -0400
Another argument for OSPF authentication it seems. However we are still out of luck in the STP announcements unless you configure all the neat little *guard features (bpdu,root etc) from Cisco et al.
On Wednesday, July 23, 2003, at 12:34 PM, alex () yuriev com wrote:
Like I said, it's not going to be perfect, but it is better than blindlyspewing out evil packets.Between me and you, ospf packets or bad stp packets are a lot more dangerousthan the whack a cisco router. Just try it. Alex
Current thread:
- Re: Cisco vulnerability and dangerous filtering techniques, (continued)
- Re: Cisco vulnerability and dangerous filtering techniques Steve (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques alex (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Richard A Steenbergen (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Patrick W. Gilmore (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques Steve (Jul 22)
- Re: Cisco vulnerability and dangerous filtering techniques Valdis . Kletnieks (Jul 22)
- RE: Cisco vulnerability and dangerous filtering techniques Patrick W. Gilmore (Jul 23)
- RE: Cisco vulnerability and dangerous filtering techniques alex (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques Scott McGrath (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques Patrick W. Gilmore (Jul 23)
- RE: Cisco vulnerability and dangerous filtering techniques Pete Kruckenberg (Jul 23)
- RE: Cisco vulnerability and dangerous filtering techniques Simon Lyall (Jul 23)
- Re: Cisco vulnerability and dangerous filtering techniques bmanning (Jul 24)