[135444] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Using IPv6 with prefixes shorter than a /64 on a LAN

daemon@ATHENA.MIT.EDU (George Bonser)
Tue Jan 25 13:51:41 2011

Date: Tue, 25 Jan 2011 10:49:51 -0800
In-Reply-To: <4D3F0144.70107@sohonet.co.uk>
From: "George Bonser" <gbonser@seven.com>
To: "Patrick Sumby" <patrick.sumby@sohonet.co.uk>,
	<nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

> >
> > So I pretty strongly disagree about your statement.  Repetitively
> > sweeping an IPv6 network to DoS/DDoS the ND protocol thereby
flooding
> > the ND cache/LRUs could be extremely effective and if not payed
> > serious attention will cause serious issues.
> >
>=20
>=20
> Yes.... This is an issue for point-to-point links but using a longer
> prefix (/126 or similar) has been suggested as a mitigation for this
> sort of attack.
>=20
> I would assume that in the LAN scenario where you have a /64 for your
> internal network that you would have some sort of stateful firewall
> sitting infront of the network to stop any un-initiated sessions. This
> therefore stops any hammering of ND cache etc. The argument then is
> that
> the number of packets hitting your firewall / bandwidth starvation
> would
> be the the alternative line of attack for a DoS/DDos but that is a
> completely different issue.
>=20
>=20

So for /64 subnets used for point-to-points you disable ND, configure
static neighbors and that's the end of it. No ND DDoS.




home help back first fref pref prev next nref lref last post