[91004] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: key change for TCP-MD5

daemon@ATHENA.MIT.EDU (Iljitsch van Beijnum)
Fri Jun 23 19:18:26 2006

In-Reply-To: <3D92608F743AE3AE5984CE45@imac-en0.delong.sj.ca.us>
Cc: NANOG list <nanog@merit.edu>
From: Iljitsch van Beijnum <iljitsch@muada.com>
Date: Sat, 24 Jun 2006 01:17:31 +0200
To: Owen DeLong <owen@delong.com>
Errors-To: owner-nanog@merit.edu


On 24-jun-2006, at 0:43, Owen DeLong wrote:

> Why couldn't the network device do an AH check in hardware before  
> passing
> the
> packet to the receive path?  If you can get to a point where all  
> connections
> or traffic TO the router should be AH, then, that will help with DOS.

If you care that much, why don't you just add an extra loopback  
address, give it an RFC 1918 address, have your peer talk BGP towards  
that address and filter all packets towards the actual interface  
address of the router?

The chance of an attacker sending an RFC 1918 packet that ends up at  
your router is close to zero and even though the interface address  
still shows up in traceroutes etc it is bullet proof because of the  
filters.

(This works even better with IPv6 link local addresses, those are  
guaranteed to be unroutable.)

home help back first fref pref prev next nref lref last post