Re: [shara] port randomization (draft-ymbk-aplusp-03)
"Jan Zorz @ go6.si" <jan@go6.si> Thu, 12 March 2009 20:48 UTC
Return-Path: <jan@go6.si>
X-Original-To: shara@core3.amsl.com
Delivered-To: shara@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id EC1F628C110 for <shara@core3.amsl.com>;
Thu, 12 Mar 2009 13:48:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.001,
BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NzR-wvpX-CJn for
<shara@core3.amsl.com>; Thu, 12 Mar 2009 13:48:13 -0700 (PDT)
Received: from ipv6.go6.si (go6.si [212.44.108.1]) by core3.amsl.com (Postfix)
with ESMTP id 874A428C0D0 for <shara@ietf.org>;
Thu, 12 Mar 2009 13:48:13 -0700 (PDT)
Received: from [IPv6:2001:470:9b8e::219:e3ff:fed4:9252] (unknown
[IPv6:2001:470:9b8e:0:219:e3ff:fed4:9252]) (Authenticated sender: jan) by
ipv6.go6.si (Postfix) with ESMTP id 2029345D8396 for <shara@ietf.org>;
Thu, 12 Mar 2009 21:48:44 +0100 (CET)
Message-ID: <49B9752B.8030407@go6.si>
Date: Thu, 12 Mar 2009 21:48:43 +0100
From: "Jan Zorz @ go6.si" <jan@go6.si>
Organization: go6.si
User-Agent: Thunderbird 2.0.0.19 (Macintosh/20081209)
MIME-Version: 1.0
To: shara@ietf.org
References: <022a01c9a2ab$fd5abf60$fd736b80@cisco.com>
<49B91C8B.5010906@go6.si> <04a201c9a338$d5ce8f70$fd736b80@cisco.com>
In-Reply-To: <04a201c9a338$d5ce8f70$fd736b80@cisco.com>
Content-Type: multipart/alternative;
boundary="------------050003090207080202050406"
Subject: Re: [shara] port randomization (draft-ymbk-aplusp-03)
X-BeenThere: shara@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Sharing of an IPv4 Address discussion list <shara.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/shara>,
<mailto:shara-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/shara>
List-Post: <mailto:shara@ietf.org>
List-Help: <mailto:shara-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/shara>,
<mailto:shara-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Mar 2009 20:48:15 -0000
Dan Wing wrote: >> How important is port randomization and how big is the impact in real >> life, >> > > Over the last 10 years there have been several attacks against > TCP and DNS that have exploited predictable emphemeral ports. The > industry response to those attacks has been to (a) randomize > ephemeral port selection (rather than incrementing to the next > port number) and (b) increase the ephemeral port range used by > the OS. > > See > http://tools.ietf.org/html/draft-ietf-tsvwg-port-randomization-02#section-1 > for more detailed answer to your question. > Dan, hi. I'm well aware of that draft, it is also referenced in in A+P draft. Maybe I was not clear enough in my question, let me re-phrase it. In shared IP solutions we are taking away ports from customers, we are taking away resources and everything is a compromise. Being said that, if we are happy with compromise, why not introduce compromise also in a dirty hack as port randomization is. So, can we live with randomization within for example range of 512 ports? Is this "good enough"? We are quite fond of accepting the compromise of shared IP as "good enough", because we have no other option, so can we accept also the compromise of less randomness in port randomization hack? I'm also curious to hear some aproximation from any HW vendor, what does allocating "one port per request" means for PRR in larger scale. I suspect this might very well be performance suicide, but this is only my speculation. If not - good, we can go in that direction, which I recognise as good also in several other ways. Thank you for your time and effort, Jan Zorz
- [shara] port randomization (draft-ymbk-aplusp-03) Dan Wing
- Re: [shara] port randomization (draft-ymbk-aplusp… Gabor.Bajko
- Re: [shara] port randomization (draft-ymbk-aplusp… Dan Wing
- Re: [shara] port randomization (draft-ymbk-aplusp… Randy Bush
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… teemu.savolainen
- Re: [shara] port randomization (draft-ymbk-aplusp… Dan Wing
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… pierre.levis
- Re: [shara] port randomization (draft-ymbk-aplusp… Lars Eggert
- Re: [shara] port randomization (draft-ymbk-aplusp… Rémi Denis-Courmont
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… Rémi Després
- Re: [shara] port randomization (draft-ymbk-aplusp… Rémi Després
- Re: [shara] port randomization (draft-ymbk-aplusp… teemu.savolainen
- Re: [shara] port randomization (draft-ymbk-aplusp… MILES DAVID
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… Dan Wing
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… Dan Wing
- Re: [shara] port randomization (draft-ymbk-aplusp… Gabor.Bajko
- Re: [shara] port randomization (draft-ymbk-aplusp… Dan Wing
- Re: [shara] port randomization (draft-ymbk-aplusp… Dan Wing
- Re: [shara] port randomization (draft-ymbk-aplusp… pierre.levis
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… mohamed.boucadair
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… mohamed.boucadair
- Re: [shara] port randomization (draft-ymbk-aplusp… Jan Zorz @ go6.si
- Re: [shara] port randomization (draft-ymbk-aplusp… mohamed.boucadair