netsec-sig - [Security-WG] Junos min-ttl and as regex backref feature
Subject: Internet2 Network Security SIG
List archive
- From: John Kristoff <>
- To:
- Subject: [Security-WG] Junos min-ttl and as regex backref feature
- Date: Fri, 18 May 2018 11:47:43 -0500
- Ironport-phdr: 9a23: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
Friends,
You may remember last year I solicited support for an enhancement
request to harden the NTP daemon on Junos. This request has been filed
with Juniper.
I'm thinking of two more I'd like to submit and am wondering if there
would again be support from this community. These are:
* enhanced GTSM support for BGP sessions
Utilizing GTSM for BGP peering sessions is not often used, because it
it is not enabled by default and it requires non-trivial firewall
filters to actually enforce.
Perhaps add a min-ttl setting under protocols bgp? Should the value
of 255 be the default so future generations can use a min-ttl setting?
* backreferences in AS path regular expressions
Cisco provides this feature and I have at least one use-case for it.
I'd like to be able to match an as-path that contains some number of
repeated ASNs (prepending) in order to apply a particular policy
(e.g. adjust LOCAL_PREF or reject the announcement altogether).
I'm curious if anyone here would find these two enhancements desirable
and if you'd be willing to sign on to a request to Juniper in support.
John
- [Security-WG] Junos min-ttl and as regex backref feature, John Kristoff, 05/18/2018
- Re: [Security-WG] Junos min-ttl and as regex backref feature, Andrew Gallo, 05/20/2018
- Re: [Security-WG] Junos min-ttl and as regex backref feature, Jeff Bartig, 05/24/2018
- Re: [Security-WG] Junos min-ttl and as regex backref feature, Dale W. Carder, 05/24/2018
- Re: [Security-WG] Junos min-ttl and as regex backref feature, John Kristoff, 05/29/2018
- Re: [Security-WG] Junos min-ttl and as regex backref feature, Jeff Bartig, 05/29/2018
- Re: [Security-WG] Junos min-ttl and as regex backref feature, John Kristoff, 05/29/2018
- Re: [Security-WG] Junos min-ttl and as regex backref feature, Jeff Bartig, 05/29/2018
Archive powered by MHonArc 2.6.19.