[140609] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Yahoo and IPv6

daemon@ATHENA.MIT.EDU (Robert Drake)
Sat May 14 23:02:34 2011

Date: Sat, 14 May 2011 23:01:46 -0400
From: Robert Drake <rdrake@direcpath.com>
To: <nanog@nanog.org>
In-Reply-To: <BANLkTinOHFpVjnO37MUGyOTe1ARSPV=Wbg@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 5/10/2011 12:57 AM, Jeff Wheeler wrote:
> Your suggestion has two main disadvantages:
> 1) it doesn't work on some platforms, because input ACL won't stop ND
> learn/solicit -- obviously this is bad
> 2) it requires you to configure a potentially large input ACL on every
> single interface on the box, and adjust that ACL whenever you
> provision more IPv6 addresses for end-hosts -- kinda like not having a
> control-plane filter, only worse
>

Might need to rewrite some portion of ND to do this, but can't a cookie 
be encoded in the ND packet and no state kept?  That should reduce the 
problem to one of a packet flood which everyone already deals with now.

Sorry if this has been suggested/shot down before.  The ND problems keep 
being mentioned and I never see this proposed and it seems like an 
obvious solution.

Robert



home help back first fref pref prev next nref lref last post