[nsp-sec] Warning for those of you with older JunOS based routers...

White, Gerard Gerard.White at bellaliant.ca
Thu Sep 8 18:55:56 EDT 2011


Today this ISP decided to announce a more specific /24 from their /19:


AS      | IP               | AS Name
25019   | 212.118.142.0    | SAUDINETSTC-AS Autonomus System Number for SaudiNet


It triggers this JunOS PR:
http://s-tools1.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2010-01-626&viewMode=view


Even in newer JunOS code (10.4R2), the prefix looks like this:


show route 212.118.142.0 extensive    

inet.0: 371027 destinations, 663293 routes (368882 active, 26 holddown, 33233 hidden)
212.118.142.0/24 (2 entries, 1 announced)
TSI:
KRT in-kernel 212.118.142.0/24 -> {indirect(1049427)}
Standby generator for 0.0.0.0/0
Page 0 idx 1 Type 1 val 1b1532a0
    Nexthop: <REMOVED>
    MED: 0
    Localpref: 100
    AS path: [855] 3257 6453 39386 25019 I (Originator)
    Cluster list:  <REMOVED>
    Originator ID: <REMOVED>
    Unrecognized Attributes: 34 bytes
    Attr flags e0 code 80: 00 00 fd 88 40 01 01 02 40 02 06 02 01 00 00 fc da 80 04 04 00 00 00 01 40 05 04 00 00 00 64
    Communities: <REMOVED>
    Cluster ID: <REMOVED>
    Originator ID: <REMOVED>


Just a FYI for those of you that may have some older JunOS based assets doing BGP...

GW
855 - Bell Aliant

-------------- next part --------------
A non-text attachment was scrubbed...
Name: PGP.sig
Type: application/pgp-signature
Size: 183 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20110908/ab823cf2/attachment-0001.sig>


More information about the nsp-security mailing list