[91022] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: key change for TCP-MD5

daemon@ATHENA.MIT.EDU (Iljitsch van Beijnum)
Mon Jun 26 05:55:12 2006

In-Reply-To: <20060626000608.GC3152@burnout.tpb.net>
Cc: nanog@merit.edu
From: Iljitsch van Beijnum <iljitsch@muada.com>
Date: Mon, 26 Jun 2006 11:54:39 +0200
To: Niels Bakker <niels=nanog@bakker.net>
Errors-To: owner-nanog@merit.edu


On 26-jun-2006, at 2:06, Niels Bakker wrote:

>> The reason IPsec helps against a DoS against the CPU is that it  
>> has an anti replay counter. IPsec implementations are supposed to  
>> maintain a window, not unlike a TCP window, that allows them to  
>> reject packets with an anti replay counter that's too far behind  
>> or ahead of the last seen packets. So in order to make a packet  
>> reach the CPU an attacker has to observe or guess an acceptable  
>> value for the anti replay counter.

> Actually, no.  In a router you can easily filter away all IP  
> packets not destined to port 25 to a certain host (for, say, a mail  
> server). However, if those packets are IPsec encrypted, these TCP  
> headers are unavailable to routers in the path.

You can't have it both ways: either you encrypt the packet so that  
nobody can look inside it, or you don't and people can.

But we weren't talking about encryption. Or about filtering packets  
that go _through_ a router. What we were talking about was using the  
IPsec authentication on BGP sessions and whether that's better than  
using TCP with MD5 in relation to DoS attacks.

home help back first fref pref prev next nref lref last post