[142882] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NDP DoS attack

daemon@ATHENA.MIT.EDU (Florian Weimer)
Sun Jul 17 07:04:46 2011

From: Florian Weimer <fw@deneb.enyo.de>
To: Mikael Abrahamsson <swmike@swm.pp.se>
Date: Sun, 17 Jul 2011 13:04:39 +0200
In-Reply-To: <alpine.DEB.2.00.1107171258280.20159@uplift.swm.pp.se> (Mikael
	Abrahamsson's message of "Sun, 17 Jul 2011 12:59:34 +0200 (CEST)")
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

* Mikael Abrahamsson:

> On Sun, 17 Jul 2011, Florian Weimer wrote:
>
>> Interesting, thnaks.  It's not the vendors I would expect, and it's
>> not based on SEND (which is not surprising at all and actually a
>> good thing).
>
> Personally I think SEND is never going to get any traction.

Last time, I was told that SEND was the way to go, despite not
actually fixing anything.  This mess is even worse than SCTP.

>> Is this actually secure in the sense that it ties addresses to
>> specific ports for both sending and receiving?  I'm asking because
>> folks have built similar systems for IPv4 which weren't.  The CLI
>> screenshots look good, better than what most folks achieve with
>> IPv4.
>
> As far as I know, it's designed to work securely in an ETTH scenario,
> which implies both sending and receiving (if I understood you
> correctly).

And it would also plug the NDP DOS vector because you've got a small
set of addresses you need to process.  Let's hope this gets buy-in
from more vendors (and across the whole switch product lines, please),
with full interoperability.

_____
NANOG mailing list
NANOG@nanog.org
https://mailman.nanog.org/mailman/listinfo/nanog

home help back first fref pref prev next nref lref last post