Re: Security hole in RIP-2

Oliver Korfmacher <okorf@netcs.com> Thu, 04 February 1993 17:22 UTC

Received: from ietf.nri.reston.va.us by IETF.CNRI.Reston.VA.US id aa07524; 4 Feb 93 12:22 EST
Received: from CNRI.RESTON.VA.US by IETF.CNRI.Reston.VA.US id aa07520; 4 Feb 93 12:22 EST
Received: from atlas.xylogics.com by CNRI.Reston.VA.US id aa13580; 4 Feb 93 12:22 EST
Received: by atlas.xylogics.com id AA04345 (5.65c/UK-2.1-930202); Thu, 4 Feb 1993 12:26:12 -0500
Received: from thuer.netcs.com by atlas.xylogics.com with SMTP id AA09774 (5.65c/UK-2.1-930202); Thu, 4 Feb 1993 12:25:55 -0500
Received: from keks.netcs.com by thuer.netcs.com with SMTP (5.67a8+/25-eef) id AA04979; Thu, 4 Feb 1993 18:20:55 +0100
Received: by keks.netcs.com (5.65/25-eef) id AA04425; Thu, 4 Feb 93 18:20:28 +0100
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: Oliver Korfmacher <okorf@netcs.com>
Message-Id: <9302041720.AA04425@keks.netcs.com>
Subject: Re: Security hole in RIP-2
To: ietf-rip@xylogics.com
Date: Thu, 04 Feb 1993 18:20:27 -0000
X-Mailer: ELM [version 2.2 PL0]
X-Charset: ASCII
X-Char-Esc: 29

> There is a potential security hole in the RIP-2 authentication caused
> by the backwards compatibility rules.  
> [..]
> There are two solutions.  Ideally, the router has to be smart enough to
> answer a RIP-1 query with a RIP-1 response, which may not be easy for
> some implementations.  
Hmm. I can't see why is is the case? It is of course clearly recognizable,
what version is requesting? But I also agree: this should be mentioned in
a comment.

	Oliver

        Oliver Korfmacher (okorf@netcs.com, whois OK11)