
I believe we turned bgp-error-tolerance on after this Vulnerability Note from CERT: https://www.kb.cert.org/vuls/id/347067 Rereading it, that sounds like what everyone is reporting here, or at least extremely similar. John Stitt ________________________________ From: Niels den Otter via NANOG <nanog@lists.nanog.org> Sent: Tuesday, May 20, 2025 8:39 AM To: nanog@lists.nanog.org <nanog@lists.nanog.org> Cc: Niels den Otter <niels.denotter@surf.nl> Subject: Re: BGP malformed update/attribute list Hello Simon, We have seen the same in our network (was a BGP update for a specific /40 (!) IPv4 prefix as far as we can see). In Juniper speak 'bgp-error-tolerance' keeps the BGP sessions up, but downstream networks might still suffer from this. Regards, Niels _______________________________________________ NANOG mailing list https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Flists.nanog.org%2Farchives%2Flist%2Fnanog%40lists.nanog.org%2Fmessage%2FCDMNBBMC54JZZZOXNL7A26Q27BVTQMFO%2F&data=05%7C02%7Cjstitt%40hop-electric.com%7Cd8603c209d2640b57fc308dd97a524f0%7C7707c291b2534ee2bcd6557cdf0fea43%7C0%7C0%7C638833457754493208%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=1%2F1SMJ7qEbo0tmCCn66OyeRLYzNhWhf25YnPp3WhpGc%3D&reserved=0<https://lists.nanog.org/archives/list/nanog@lists.nanog.org/message/CDMNBBMC54JZZZOXNL7A26Q27BVTQMFO/> CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe. If you are not expecting this message contact the sender directly via phone/text to verify.