[69363] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: BGP TTL check in 12.3(7)T

daemon@ATHENA.MIT.EDU (Blaine Christian)
Thu Apr 8 12:51:07 2004

From: "Blaine Christian" <blaine.christian@mci.com>
To: "'Pekka Savola'" <pekkas@netcore.fi>
Cc: "'vijay gill'" <vgill@vijaygill.com>, <nanog@merit.edu>
Date: Thu, 8 Apr 2004 12:50:25 -0400
In-reply-to: <Pine.LNX.4.44.0404081929510.1435-100000@netcore.fi>
Errors-To: owner-nanog-outgoing@merit.edu


Hi Pekka,

> 
> Spoofing filters (source address is most useful, but a few 
> protocols being deployed now also require destination address 
> based filtering) at your border are still best to prevent 
> external abuse to your 
> infrastructure?
> 

I agree that spoofing filters help also (perhaps we are not
communicating)...  But TTL helps in places where you can't just anti-spoof.
For example, suppose you have box X which can do ZERO filtering at line
rate.  Then box Y that can...

X->Y

You have a BGP session between X and Y and many untrusted things talking to
X.  How would I anti-spoof X's protocol traffic when I am at Y?  The nice
thing about X is that it does, hopefully reliably, decrement the TTL.

Michel, this same answer should apply to your statement.  I agree that
anti-spoofing helps.  But TTL filtering can fix some very interesting
problems.

BTW, I am only commenting on TTL filtering and not necessarily Cisco's
implementation (I have not even read through their implementation yet).

Regards,

Blaine

  


home help back first fref pref prev next nref lref last post