<html><head></head><body><div dir="auto">Hello!<br><br>Can't open that link for whatever reason, anyway the last problem with sending an invalid path attribute in BGP, killing some sessions repeatedly, didn't affect BIRD at all.<br><br>Anyway, BIRD transferred this attribute (as unknown transitional) through the whole Internet, so we are now working on adding a possibility to delete (or also set) any BGP attribute, even unknown.<br><br>Hope that helps.<br>Maria<br></div><br><br><div class="gmail_quote"><div dir="auto">On 18 September 2023 15:41:32 CEST, Michael Lambert <lambert@andrew.cmu.edu> wrote:</div><blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<pre class="k9mail"><div dir="auto">As outlined in <a href="https://kb.cert.org/vuls/id/347067,">https://kb.cert.org/vuls/id/347067,</a> there is an attack that uses specially crafted Path Attributes in a BGP UPDATE message to disrupt peering sessions. I don’t recall seeing any discussions of this attack on this list. Is BIRD susceptible?<br><br>Thanks,<br>Michael<br><br><br></div></pre></blockquote></div><div dir="auto"><div class='k9mail-signature'>-- <br>Maria Matejka (she/her) | BIRD Team Leader | CZ.NIC, z.s.p.o.</div></div></body></html>