Re: [v6ops] IPv6 link-local traffic questions

Brian E Carpenter <brian.e.carpenter@gmail.com> Wed, 25 March 2020 02:03 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9479D3A07A2; Tue, 24 Mar 2020 19:03:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5lT-0DZYywxw; Tue, 24 Mar 2020 19:03:51 -0700 (PDT)
Received: from mail-pf1-x441.google.com (mail-pf1-x441.google.com [IPv6:2607:f8b0:4864:20::441]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9C853A078F; Tue, 24 Mar 2020 19:03:51 -0700 (PDT)
Received: by mail-pf1-x441.google.com with SMTP id j1so282655pfe.0; Tue, 24 Mar 2020 19:03:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=L3VkyCuTcjbFBH+4fT56le48S44v/bxeVdXt5Glv+P8=; b=qBwekb1D9DobxU5nUymyFvbbNcHvXF5wvcW1Kg9xVPE7l3jTwej9tKU1QH7ZlIRqDd hgi8mkCpFtl0uiK9MOz4dfjMD178+G4kZOeqzy3axrVPTpzaf9iY8XuC0LKv+8BIM0Bl QE51/WmYrm3umqCJeZt2r8+d6VEqv1fyPAPr15ie/iYeHY2iFL//ybB8oKzwESb7If98 ZUvb3fVwiFZK9L0AAbjEC8Xe5FezwDHtXSdZdIQLRPLBtOqUugmpiSt93gZimU331kqG j1bEQ5sbuXwu1y4txZSaiw0HrXoxCPfPPZtTmDFW5+lT8bIR3KrnLNu/RYyz8mOyiuO5 5Kww==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=L3VkyCuTcjbFBH+4fT56le48S44v/bxeVdXt5Glv+P8=; b=YwNwYAPnwBuq5QZQmZcHW+pyS09VzdbUIWhh/cQj5l+jXB8dP4KGNv3GOeuaINmVXL AsM/B8nhw3GOSVkV66XrNhj9R7Zho02YNvfSfCRfDwZSu1l/qfzmhF7qr60zLvTuaYN/ grtnzGbKUG0hnfzLBn2BMuxFmprUSOdEJxWMWZI4ur0vt87PpBv6+a0Ywp+8a86R4cue KOgi/r2OAQnRW+5yp3fkgLrjCCrwVj2IKIHTUgPQgtbVWXbQNM6zDRw20Hy5xviZWGpq xj1smfG8L2P+N+RrUSC1ZJ2ERFFfIhuaG6nA/anAwDrewU3ln1987C4F0fYfShnrixmJ bDgg==
X-Gm-Message-State: ANhLgQ0XVxaXE0xY4emdQSmNAuyDGJdBJu/xNBz3+7gKXrYaPFnWWJk5 D0Tfovkm4DQ9PoSCbSRLjctPJEIL
X-Google-Smtp-Source: ADFU+vsv2ADuFgGrenR/iicctd5m1CNIdP4ZUgwgAh/s7QP2m69LzcxuhkfLN0MyJN6a0zIb+wkb1A==
X-Received: by 2002:a65:6447:: with SMTP id s7mr714204pgv.163.1585101830809; Tue, 24 Mar 2020 19:03:50 -0700 (PDT)
Received: from [192.168.178.30] ([165.84.25.143]) by smtp.gmail.com with ESMTPSA id i11sm3334868pje.30.2020.03.24.19.03.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 24 Mar 2020 19:03:49 -0700 (PDT)
Subject: Re: [v6ops] IPv6 link-local traffic questions
To: Owen DeLong <owen@delong.com>, Erik Kline <ek.ietf@gmail.com>
Cc: V6 Ops List <v6ops@ietf.org>, 6man <6man@ietf.org>
References: <20200312000016.GO54522@faui48f.informatik.uni-erlangen.de> <CAFU7BAT-LP5TC9dpYw+5j8T8H_8XMF=tcY-Qsbg5=MOgUYNk+A@mail.gmail.com> <CABNhwV1uCFHCO9r3NK7QeqZ4gvrquoD_534LXoykaf59S48rpA@mail.gmail.com> <1584173474.2857.102.camel@biplane.com.au> <CABNhwV3VCPmcaGNyf=9dX4vcrsSreRGgkRDh0zQD+VLqG-g63Q@mail.gmail.com> <CABNhwV0D71380ZPWTLHu-LM=sz1OK6aB0du=g7uW-gxLdfGvsg@mail.gmail.com> <CA+wi2hMPk6init=1Q1+S0SzTCzOqSDbMNpsD4rUBB0VEo1BkfA@mail.gmail.com> <CABNhwV3Z=YPvU3=X4WOxF1+JRBMovucOdVDa67g1Tv4Yo7+G+A@mail.gmail.com> <CAMGpriVoOufyFhn8tzYvO5S3jJ5=eJz324=3jPJQmK1MiyPQ2g@mail.gmail.com> <5D374DA6-15B2-47AD-97B4-2BCC120859D1@delong.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <b34e19a1-0ae4-b419-b7df-2c4a893ac9a3@gmail.com>
Date: Wed, 25 Mar 2020 15:03:45 +1300
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <5D374DA6-15B2-47AD-97B4-2BCC120859D1@delong.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/neulOaBOeuvlY5gJ6lSdNv0hAZo>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2020 02:03:54 -0000

Owen,

On 25-Mar-20 11:51, Owen DeLong wrote:
>>
>>         TTL security is a necessity for ND with limited risk of run away ND packets as it’s  minimal bandwidth usage.
>>
>>
>>        With a multicast stream the risk is much greater if forwarded multiple hops past the BFER PE as stated and maybe a high data rate stream so undesirable to ever happen.
>>
>>      ND is the only protocol I know of that uses TTL security.  
>>
>>     I would go with TTL=1.
> 
> If you think this through, it depends on which problem you are trying to solve.
> 
> If you are looking to make sure that your packet won’t get accidentally forwarded by a non-malicious router, then a hop limit of 1 works best.
> If you are looking to make absolutely certain that the packet didn’t come from a non-local source, then a hop limit of 255 is the only choice.
> 
> If you use a hop limit of 1, then a remote attacker only needs to craft a packet with the correct initial hop limit to ensure that it arrives on
> your link what the appropriate remaining hop limit of 1.

Only if the router violates the spec:
"  Routers must not forward any packets with Link-Local source or
   destination addresses to other links." [RFC4291]
Do we have any evidence of routers that are broken in this way?

    Brian
 
> OTOH, if you require a hop limit of 255 on the receive side (thus requiring that the sender use a hop limit of 255), there’s no way to get
> a crafted packet through a (non-malicious) router and still have the packet retain a hop limit of 255.
> 
> Owen
> 
> 
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>