<div dir="ltr"><div dir="auto">Hoi,</div><div dir="auto"><br></div><div dir="auto">The researcher published an article which claimed bird and bird2 are immune to the attack described. </div><div dir="auto"><br></div><div dir="auto"><a href="https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling">https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling</a><br></div></div><div dir="auto"><br></div><div dir="auto">Pim</div><div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Mon, 18 Sep 2023 at 15:52, Michael Lambert <<a href="mailto:lambert@andrew.cmu.edu" target="_blank">lambert@andrew.cmu.edu</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">As outlined in <a href="https://kb.cert.org/vuls/id/347067" rel="noreferrer" target="_blank">https://kb.cert.org/vuls/id/347067</a>, there is an attack that uses specially crafted Path Attributes in a BGP UPDATE message to disrupt peering sessions. I don’t recall seeing any discussions of this attack on this list. Is BIRD susceptible?<br>
<br>
Thanks,<br>
Michael<br>
<br>
<br>
</blockquote></div></div>