Re: [shara] port randomization (draft-ymbk-aplusp-03)

"Jan Zorz @ go6.si" <jan@go6.si> Sat, 14 March 2009 07:45 UTC

Return-Path: <jan@go6.si>
X-Original-To: shara@core3.amsl.com
Delivered-To: shara@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3E4573A6985 for <shara@core3.amsl.com>; Sat, 14 Mar 2009 00:45:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zlyp98I--Ysn for <shara@core3.amsl.com>; Sat, 14 Mar 2009 00:45:16 -0700 (PDT)
Received: from nety.net (poirot.nety.net [89.212.42.194]) by core3.amsl.com (Postfix) with ESMTP id 312D83A67DA for <shara@ietf.org>; Sat, 14 Mar 2009 00:45:14 -0700 (PDT)
Received: from [192.168.1.106] (unverified [89.212.15.159]) by nety.net (SurgeMail 3.9e) with ESMTP id 3462958-1926523 for multiple; Sat, 14 Mar 2009 08:45:52 +0100
Message-ID: <49BB60AF.1010806@go6.si>
Date: Sat, 14 Mar 2009 08:45:51 +0100
From: "Jan Zorz @ go6.si" <jan@go6.si>
Organization: go6.si
User-Agent: Thunderbird 2.0.0.19 (Macintosh/20081209)
MIME-Version: 1.0
To: pierre.levis@orange-ftgroup.com
References: <022a01c9a2ab$fd5abf60$fd736b80@cisco.com><49B91C8B.5010906@go6.si><04a201c9a338$d5ce8f70$fd736b80@cisco.com> <49B9752B.8030407@go6.si> <D109C8C97C15294495117745780657AE0B6BEB6B@ftrdmel1>
In-Reply-To: <D109C8C97C15294495117745780657AE0B6BEB6B@ftrdmel1>
Content-Type: multipart/alternative; boundary="------------050103050502040001060207"
X-Originating-IP: 89.212.15.159
X-Authenticated-User: jan@pragma.si
X-Encryption: SSL encrypted
X-IP-stats: Notspam Incoming Last 1, First 27, in=6, out=0, spam=0 Known=true ip=89.212.15.159
Cc: shara@ietf.org
Subject: Re: [shara] port randomization (draft-ymbk-aplusp-03)
X-BeenThere: shara@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Sharing of an IPv4 Address discussion list <shara.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/shara>, <mailto:shara-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/shara>
List-Post: <mailto:shara@ietf.org>
List-Help: <mailto:shara-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/shara>, <mailto:shara-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Mar 2009 07:45:17 -0000

Pierre, hi.

pierre.levis@orange-ftgroup.com wrote:
> This is a good question.
Thnx. Let's wait for an answer to pop up (if) :)
> I'm also wondering, currently how many OSs and how many NATs do 
> implement a good randomization function?
Not sure... but rather than port randomization I would prefer to see 
dnssec implemented in clients, maybe also combined with dnscurve.
>  
> More generally, in port range solutions we (I include myself) propose 
> sophisticated functions that surely make sense.
We have no other option. But, how sophisticated (complex) may we get? 
Where is the balance between "good enough" usability and complexity on 
the other hand?
> However, I do believe that, if we want to see vendors rapidly 
> implement port range capabilities, we have to agree on a minimum set 
> of functionalities that makes it possible to build a viable port range 
> solution.
If we want to assure at least minimum compatibility between different 
vendors equipment and still have a solution, that makes sense to 
customer, then we need to set, what minimum means. I suspect every 
vendor will speculate with it's own proprietary features, so we need to 
set basics straight. You are perfectly right.
> I'm very convinced, for example, that it is straighforward (I mean 
> almost no cost and without any performance lost) for all vendors to 
> upgrade their routers to PRRs (Port Range Router), we did that on 
> Linux only by configuration.
Did you implement non-contiguous port allocations?

regards, Jan Zorz
>  
>  
>  
> Pierre
>
> ------------------------------------------------------------------------
> *De :* shara-bounces@ietf.org [mailto:shara-bounces@ietf.org] *De la 
> part de* Jan Zorz @ go6.si
> *Envoyé :* jeudi 12 mars 2009 21:49
> *À :* shara@ietf.org
> *Objet :* Re: [shara] port randomization (draft-ymbk-aplusp-03)
>
>
>
> Dan Wing wrote:
>>> How important is port randomization and how big is the impact in real 
>>> life,
>>>     
>>
>> Over the last 10 years there have been several attacks against
>> TCP and DNS that have exploited predictable emphemeral ports.  The
>> industry response to those attacks has been to (a) randomize 
>> ephemeral port selection (rather than incrementing to the next 
>> port number) and (b) increase the ephemeral port range used by 
>> the OS.
>>
>> See
>> http://tools.ietf.org/html/draft-ietf-tsvwg-port-randomization-02#section-1
>> for more detailed answer to your question.
>>   
> Dan, hi.
>
> I'm well aware of that draft, it is also referenced in in A+P draft. 
> Maybe I was not clear enough in my question, let me re-phrase it.
> In shared IP solutions we are taking away ports from customers, we are 
> taking away resources and everything is a compromise.
> Being said that, if we are happy with compromise, why not introduce 
> compromise also in a dirty hack as port randomization is.
>  So, can we live with randomization within for example range of 512 
> ports? Is this "good enough"? We are quite fond of accepting
> the compromise of shared IP as "good enough", because we have no other 
> option, so can we accept also the compromise of less randomness in
> port randomization hack?
>
> I'm also curious to hear some aproximation from any HW vendor, what 
> does allocating "one port per request" means for PRR in larger scale. 
> I suspect this
> might very well be performance suicide, but this is only my 
> speculation. If not - good, we can go in that direction, which I 
> recognise as good also in several other ways.
>
> Thank you for your time and effort, Jan Zorz