[142880] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NDP DoS attack

daemon@ATHENA.MIT.EDU (Florian Weimer)
Sun Jul 17 06:48:25 2011

From: Florian Weimer <fw@deneb.enyo.de>
To: Mikael Abrahamsson <swmike@swm.pp.se>
Date: Sun, 17 Jul 2011 12:47:48 +0200
In-Reply-To: <alpine.DEB.2.00.1107171222060.20159@uplift.swm.pp.se> (Mikael
	Abrahamsson's message of "Sun, 17 Jul 2011 12:31:25 +0200 (CEST)")
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

* Mikael Abrahamsson:

> On Sun, 17 Jul 2011, Florian Weimer wrote:
>
>> Others use tunnels, PPPoE or lots of scripting, so certainly
>> something can be done about it.  To my knowledge, SAVI SEND is still
>> at a similar stage.  Pointers to vendor documentation would be
>> appreciated if this is not the case.
>
> <www.ietf.org/proceedings/79/slides/savi-6.pdf>

Interesting, thnaks.  It's not the vendors I would expect, and it's
not based on SEND (which is not surprising at all and actually a good
thing).

Is this actually secure in the sense that it ties addresses to
specific ports for both sending and receiving?  I'm asking because
folks have built similar systems for IPv4 which weren't.  The CLI
screenshots look good, better than what most folks achieve with IPv4.

_____
NANOG mailing list
NANOG@nanog.org
https://mailman.nanog.org/mailman/listinfo/nanog

home help back first fref pref prev next nref lref last post