[76880] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IPv6, IPSEC and DoS

daemon@ATHENA.MIT.EDU (Iljitsch van Beijnum)
Mon Jan 3 10:55:14 2005

In-Reply-To: <Pine.GSO.4.58.0501031027060.24001@kungfunix.net>
Cc: nanog@nanog.org
From: Iljitsch van Beijnum <iljitsch@muada.com>
Date: Mon, 3 Jan 2005 16:54:41 +0100
To: "J. Oquendo" <sil@politrix.org>
Errors-To: owner-nanog-outgoing@merit.edu


On 3-jan-05, at 16:29, J. Oquendo wrote:

>> To prevent ARP or ND spoofing attack you should have L2 switch 
>> support to
>> it! Or you can use static ARP or ND entries, which is rather 
>> difficult to
>> maintain.

> Funny you should mention this I thought about this but figure the
> following, regardless of VLAN/PVLAN/ settings, switches still need to
> build an ARP table

Yes, and that's why you need static MAC forwarding tables too.

If you can then enforce the port->MAC->IP mappings you're pretty much 
bullet proof. I know there are switches that can handle the port->MAC 
part. An alternative for the MAC->IP part would be the TCP MD5 option 
or IPsec.


home help back first fref pref prev next nref lref last post