{"draft":"draft-ietf-idr-bgp-vuln-01","doc_id":"RFC4272","title":"BGP Security Vulnerabilities Analysis","authors":["S. Murphy"],"format":["ASCII","HTML"],"page_count":"22","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Inter-Domain Routing","abstract":"Border Gateway Protocol 4 (BGP-4), along with a host of other\r\ninfrastructure protocols designed before the Internet environment became\r\nperilous, was originally designed with little consideration for\r\nprotection of the information it carries. There are no mechanisms\r\ninternal to BGP that protect against attacks that modify,\r\ndelete, forge, or replay data, any of which has the potential to disrupt\r\noverall network routing behavior.\r\n\r\nThis document discusses some of the security issues with BGP\r\nrouting data dissemination. This document does not discuss\r\nsecurity issues with forwarding of packets. This memo provides information for the Internet community.","pub_date":"December 2005","keywords":["border gateway protocol","attacks","risks","insider threat"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4272","errata_url":null}