[91005] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: key change for TCP-MD5

daemon@ATHENA.MIT.EDU (Patrick W. Gilmore)
Fri Jun 23 19:35:11 2006

In-Reply-To: <1814C39E-B860-45CB-BDBB-5C91A1F8A511@muada.com>
Cc: "Patrick W. Gilmore" <patrick@ianai.net>
From: "Patrick W. Gilmore" <patrick@ianai.net>
Date: Fri, 23 Jun 2006 19:34:40 -0400
To: NANOG list <nanog@merit.edu>
Errors-To: owner-nanog@merit.edu


On Jun 23, 2006, at 7:17 PM, Iljitsch van Beijnum wrote:
> On 24-jun-2006, at 0:43, Owen DeLong wrote:
>
>> Why couldn't the network device do an AH check in hardware before  
>> passing
>> the
>> packet to the receive path?  If you can get to a point where all  
>> connections
>> or traffic TO the router should be AH, then, that will help with DOS.
>
> If you care that much, why don't you just add an extra loopback  
> address, give it an RFC 1918 address, have your peer talk BGP  
> towards that address and filter all packets towards the actual  
> interface address of the router?
>
> The chance of an attacker sending an RFC 1918 packet that ends up  
> at your router is close to zero and even though the interface  
> address still shows up in traceroutes etc it is bullet proof  
> because of the filters.

Why is this better than using the TTL hack?  Which is easier to  
configure, and at least as secure.

-- 
TTFN,
patrick

home help back first fref pref prev next nref lref last post