[32132] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Defeating DoS Attacks Through Accountability

daemon@ATHENA.MIT.EDU (Mark Prior)
Sun Nov 12 00:26:51 2000

To: Valdis.Kletnieks@vt.edu
Cc: Mark Mentovai <mark-list@mentovai.com>,
	Simon Lyall <simon.lyall@ihug.co.nz>, nanog@merit.edu
In-reply-to: Your message of "Sat, 11 Nov 2000 22:48:52 CDT."
             <200011120348.eAC3mrw23276@black-ice.cc.vt.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <12426.974006506.1@connect.com.au>
Date: Sun, 12 Nov 2000 15:51:46 +1030
From: Mark Prior <mrp@connect.com.au>
Message-Id: <20001112052152.31B1710B25@kuji.off.connect.com.au>
Errors-To: owner-nanog-outgoing@merit.edu


     > Not so fast, there are situations when you are authorized to have a certain
     > chunk of address space but elect not to advertise it a certain way for
     > whatever reason.  Maybe someone has a pipe that they want to use for
     > outbound traffic only and they don't want to use it at all inbound traffic,
     > and as a result, they don't advertise their routes across it.  What
     > justification do you use for dropping traffic that falls into this category?

     It's a general principle.

     Anyhow, they're going to get damned little inbound traffic unless they
     announce a route for it to *someplace*.   I think the original *general*
     policy was "If we don't have ANY route for it, we don't accept the traffic",
     which sort of makes sense - how would you get through a TCP 3-way handshake
     if the SYN+ACK always got back a ICMP Host Unreachable?  I saw no requirement
     that the routing not be assymetric, only that routing exist.

     I'm sure Mark Prior will correct me if I mis-read him... ;)

Actually since we use "ip verify unicast reverse-path" we expect the
route to come from the same place as the traffic.

Mark.


home help back first fref pref prev next nref lref last post