Re: [shara] port randomization (draft-ymbk-aplusp-03)

"Jan Zorz @ go6.si" <jan@go6.si> Tue, 17 March 2009 10:52 UTC

Return-Path: <jan@go6.si>
X-Original-To: shara@core3.amsl.com
Delivered-To: shara@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0D8F93A6A94 for <shara@core3.amsl.com>; Tue, 17 Mar 2009 03:52:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.366
X-Spam-Level:
X-Spam-Status: No, score=-2.366 tagged_above=-999 required=5 tests=[AWL=0.232, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PHr0JVLUDpbH for <shara@core3.amsl.com>; Tue, 17 Mar 2009 03:52:35 -0700 (PDT)
Received: from ipv6.go6.si (go6.si [212.44.108.1]) by core3.amsl.com (Postfix) with ESMTP id DB2673A67DA for <shara@ietf.org>; Tue, 17 Mar 2009 03:52:34 -0700 (PDT)
Received: from [IPv6:2001:470:9bd4::219:e3ff:fe35:fde2] (unknown [IPv6:2001:470:9bd4:0:219:e3ff:fe35:fde2]) (Authenticated sender: jan) by ipv6.go6.si (Postfix) with ESMTP id 976B846F104E; Tue, 17 Mar 2009 11:53:11 +0100 (CET)
Message-ID: <49BF8115.307@go6.si>
Date: Tue, 17 Mar 2009 11:53:09 +0100
From: "Jan Zorz @ go6.si" <jan@go6.si>
Organization: go6.si
User-Agent: Thunderbird 2.0.0.19 (Macintosh/20081209)
MIME-Version: 1.0
To: Dan Wing <dwing@cisco.com>
References: <022a01c9a2ab$fd5abf60$fd736b80@cisco.com><49B91C8B.5010906@go6.si><04a201c9a338$d5ce8f70$fd736b80@cisco.com><49B9752B.8030407@go6.si> <051901c9a64a$0256bf40$fd55150a@cisco.com><49BE9F0D.2080804@go6.si> <06e601c9a697$e6c67c90$fd55150a@cisco.com> <A99B171D26E1564B92D36826128CD66127EE106A92@NOK-EUMSG-01.mgdnok.nokia.com> <000c01c9a69f$e7ab3da0$c2f0200a@cisco.com>
In-Reply-To: <000c01c9a69f$e7ab3da0$c2f0200a@cisco.com>
Content-Type: multipart/alternative; boundary="------------070304040005070400020506"
Cc: Gabor.Bajko@nokia.com, shara@ietf.org
Subject: Re: [shara] port randomization (draft-ymbk-aplusp-03)
X-BeenThere: shara@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Sharing of an IPv4 Address discussion list <shara.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/shara>, <mailto:shara-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/shara>
List-Post: <mailto:shara@ietf.org>
List-Help: <mailto:shara-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/shara>, <mailto:shara-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Mar 2009 10:52:36 -0000

Dan, Gabor, hi.
>>     
>>> Wouldn't a lease time associated with each allocated port or 
>>> port range be enough?
>>>       
>> Somewhat; the CPE might want to get a new port more aggressively
>> for whatever reason.
>>
>> Let's pretend we had a SHARA solution in place in 2005, and 
>> everybody agreed in 2005 that a 1 hour lease made sense.  The
>> SP equipment was configured to provide a 1 hour lease of a
>> bunch of random ports.  Then Kaminsky DNS attack surfaces in 2008, 
>> 3 years later.  Due to that attack, CPE want to get a fresh, 
>> random UDP port for every DNS query.  Does the existing DHCP 
>> lease mechanism support a CPE wanting/needing to do that?  It
>> is my understanding that it does not;
>>     
>
> That is, for some ports (read: applications), aggressively
> short port leases may be desirable while for other ports it 
> may be desirable to have longer leases.  Having the client
> request a short lease duration for any port might work, but
> seems chatty because the client will have to refresh the
> lease even for ports that are actively sending/receiving
> traffic.  The PRR can already tell which ports are actively
> sending/receiving traffic (because it is forwarding that
> traffic).
>
> Perhaps this is getting too much into the details of the
> design of the protocol between the CPE and the PRR.
>
> -d
>
>   
Pierre joined me with my question, how big allocation of ports is big 
enough for randomisation. Let's try to find out that first.
The other suggestion, that I found quite interesting (if not brilliant) 
is to offload DNS resolving to the core (PRR?) and do port randomisation 
there.

Regards, Jan Zorz