[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
BGP Security Research Question
- Subject: BGP Security Research Question
- From: Patrick.Darden at p66.com (Darden, Patrick)
- Date: Tue, 4 Nov 2014 07:35:31 -0600
- In-reply-to: <CAJDTUxOuQeBr2bS0sYJWkZWU7OJLb9+t50Rgccz=ZXx7OfxCGw@mail.gmail.com>
- References: <CAJDTUxOuQeBr2bS0sYJWkZWU7OJLb9+t50Rgccz=ZXx7OfxCGw@mail.gmail.com>
I don't think anyone uses S-BGB or soBGP in the wild--except on Internet2 (debatable whether I2 is in the wild). Mostly just labs and classrooms...?
We get zmap/nmap/xmap scans on our BGP speakers constantly. However, most people do a tight lockdown on anything internet-exposed, limiting useful information for most speakers to whatever their prime function is (routing, gathering, reflecting, etc.)
--Patrick Darden
-----Original Message-----
From: NANOG [mailto:nanog-bounces at nanog.org] On Behalf Of Anthony Weems
Sent: Monday, November 03, 2014 9:58 PM
To: NANOG
Subject: [EXTERNAL]BGP Security Research Question
I'm a student in college learning about networking and, specifically, BGP.
Does anyone have any statistics on the use of S-BGP or soBGP in the wild?
I've read a few papers / RFCs on the subject (from Cisco and the like), but I haven't been able to find any information about actual usage.
Additionally, do people scan BGP speakers in the same sense that researchers perform scans of the Internet (e.g. zmap)?
--
Anthony Weems