Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop

Ole Trøan <otroan@employees.org> Thu, 01 November 2012 13:10 UTC

Return-Path: <otroan@employees.org>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1C4D21F8B6F for <v6ops@ietfa.amsl.com>; Thu, 1 Nov 2012 06:10:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.299
X-Spam-Level:
X-Spam-Status: No, score=-10.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f560mZoKDBjj for <v6ops@ietfa.amsl.com>; Thu, 1 Nov 2012 06:10:46 -0700 (PDT)
Received: from ams-iport-3.cisco.com (ams-iport-3.cisco.com [144.254.224.146]) by ietfa.amsl.com (Postfix) with ESMTP id 633AF21F93E8 for <v6ops@ietf.org>; Thu, 1 Nov 2012 06:09:49 -0700 (PDT)
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EAFt0klCQ/khM/2dsb2JhbABEw2iBCIIeAQEBAwESAWYFCwsSNEkOBi4Hh14Gm2mgKowQhUVhA6ROgWuCcIFb
X-IronPort-AV: E=Sophos;i="4.80,693,1344211200"; d="scan'208";a="9265081"
Received: from ams-core-3.cisco.com ([144.254.72.76]) by ams-iport-3.cisco.com with ESMTP; 01 Nov 2012 13:09:44 +0000
Received: from dhcp-lys02-vla252-10-147-117-91.cisco.com (dhcp-lys02-vla252-10-147-117-91.cisco.com [10.147.117.91]) by ams-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id qA1D9hOV018216 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 1 Nov 2012 13:09:44 GMT
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 6.1 \(1498\))
From: Ole Trøan <otroan@employees.org>
In-Reply-To: <CAKD1Yr3WOET7o9Ke5NO0p70dBZ+UbMUD4xR5ZvP7SYyNcdL0vw@mail.gmail.com>
Date: Thu, 01 Nov 2012 14:09:41 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <042A1B68-33DA-47FA-8E80-4A635E405E97@employees.org>
References: <CAKD1Yr13cNspdWvTaXxHt4R_8UB-CKeA4nq8_XWrkbFGCgW7Gg@mail.gmail.com> <5090DECF.3050100@gmail.com> <CAKD1Yr1dUy-f78A2+kfA7NjpzD0WQRT8iwqGYAm5A=Erodpn-A@mail.gmail.com> <20121031.122110.41655699.sthaug@nethelp.no> <50910E41.2030100@gmail.com> <CAKD1Yr0mTTcVeq+Qf0fLv3UCBP_90QmStkK3Ha4tDdm3FxJjVA@mail.gmail.com> <50915F86.7050304@gmail.com> <509165B8.404@si6networks.com> <509169C2.9040208@isi.edu> <50916F21.6030303@si6networks.com> <509174F1.8080809@isi.edu> <50924264.7040300@gmail.com> <76E349F3-6022-4042-9B44-57507593B8DE@employees.org> <CAKD1Yr3WOET7o9Ke5NO0p70dBZ+UbMUD4xR5ZvP7SYyNcdL0vw@mail.gmail.com>
To: Lorenzo Colitti <lorenzo@google.com>
X-Mailer: Apple Mail (2.1498)
Cc: Fernando Gont <fgont@si6networks.com>, v6ops@ietf.org
Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Nov 2012 13:10:46 -0000

Lorenzo,

> I don't see how we can build protocols to accommodate middle boxes, and we have already done RFC3514.
> 
> I'm sorry, but there are real operational needs here.
> 
> Here's an example: suppose I am under attack by a TCP SYN flood and want to rate-limit it or filter it out so I can process legitimate traffic.
> 
> It would be reasonable for me to want to do this on a peering router, because it's as close as possible to the source, and it's a high-capacity, scalable box that needs to process each packet anyway.
> 
> I don't want to carry tens of gigabits of useless attack packets all the way the way through the network to the end host, and overwhelm it, so I can drop them there. And I also don't want to put stateful firewalls at each peering connection, because the firewalls cost a lot of money, take up space in POPs and connecting them wastes expensive ports on peering routers.
> 
> The right way to deal with this is to rate-limit or drop on the routers. You're saying the architecture doesn't allow this? Then I'm sorry, but we need a better architecture. 

yes, we need a better architecture. IPv4 and IPv6 are not different here.
I disagree that the architecture you propose is a better one though.

if I understand you correctly, to solve the above problem you need:
 - deprecate all IPv6 extension headers
 - deprecate IPv4 and IPv6 fragmentation
 - ban use of IPsec
 - ban any new transport protocol, e.g. SCTP

aren't there other solutions to this problem? no other attack signature?

cheers,
Ole