[120520] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IGMP and PIM protection

daemon@ATHENA.MIT.EDU (Scott Morris)
Wed Dec 23 09:28:12 2009

Date: Wed, 23 Dec 2009 09:24:44 -0500
From: Scott Morris <swm@emanon.com>
To: Glen Kent <glen.kent@gmail.com>
In-Reply-To: <92c950310912230617x34a84839o4fb9c74f2337f880@mail.gmail.com>
Cc: nanog@nanog.org
Reply-To: swm@emanon.com
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

So we're looking to complicate things for the same of complicating
them?  Using a predictable "security" doesn't exactly make things secure
does it?

On the links that you are running PIM or IGMP on, do you not have  a
predictable set of clients and therefore problems?  Or are we trying to
protect against something I'm not thinking of?  ;)

Scott


Glen Kent wrote:
>> Would encrypting multicast not fundamentally break the concept of multicast
>> itself, unless you're encrypting multicast traffic over a backbone?
>>
>>     
>
> No, i wasnt alluding to encrypting the multicast traffic. I was
> thinking of using ESP-NULL (AH is optional) for the IGMP/PIM packets.
>
> Affably,
> Kent
>
>
>   


home help back first fref pref prev next nref lref last post