[v6ops] ICMP/ICMPv6 network ingress filtering (Fwd: New Version Notification for draft-gont-opsec-icmp-ingress-filtering-00.txt)

Fernando Gont <fgont@si6networks.com> Thu, 28 August 2014 17:44 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 757ED1A886F; Thu, 28 Aug 2014 10:44:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HAiQFhJJSwOZ; Thu, 28 Aug 2014 10:44:29 -0700 (PDT)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:8240:6:a::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD42C1A0B82; Thu, 28 Aug 2014 10:44:29 -0700 (PDT)
Received: from [2001:5c0:1000:a::503] by web01.jbserver.net with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128) (Exim 4.84) (envelope-from <fgont@si6networks.com>) id 1XN3kI-0002gy-MV; Thu, 28 Aug 2014 19:44:27 +0200
Message-ID: <53FF6A6F.5010508@si6networks.com>
Date: Thu, 28 Aug 2014 14:44:15 -0300
From: Fernando Gont <fgont@si6networks.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.0
MIME-Version: 1.0
To: "'opsec@ietf.org'" <opsec@ietf.org>, IPv6 Operations <v6ops@ietf.org>
References: <20140828173747.6623.76624.idtracker@ietfa.amsl.com>
In-Reply-To: <20140828173747.6623.76624.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20140828173747.6623.76624.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/v6ops/NiwDzE9YXZz8HkHaf49y4UiC0EU
Subject: [v6ops] ICMP/ICMPv6 network ingress filtering (Fwd: New Version Notification for draft-gont-opsec-icmp-ingress-filtering-00.txt)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Aug 2014 17:44:32 -0000

Folks,

Based on the recent discussion we have had about ICMP-based DoS attacks,
we have posted an I-D which describes and suggests that network ingress
filtering be applied on ICMPv4 and ICMPv6 error messages (based on the
addresses of the embedded payload).

The I-D is available at:
<http://www.ietf.org/internet-drafts/draft-gont-opsec-icmp-ingress-filtering-00.txt>

Any feedback will be very appreciated.

Thanks!

Best regards,
Fernando




-------- Forwarded Message --------
Subject: New Version Notification for
draft-gont-opsec-icmp-ingress-filtering-00.txt
Date: Thu, 28 Aug 2014 10:37:47 -0700
From: internet-drafts@ietf.org
To: Will(Shucheng) Liu <liushucheng@huawei.com>, Jeroen Massar
<jeroen@massar.ch>, Ray Hunter <v6ops@globis.net>, Fernando Gont
<fgont@si6networks.com>, Ray Hunter <v6ops@globis.net>, Jeroen Massar
<jeroen@massar.ch>, Fernando Gont <fgont@si6networks.com>, Shucheng LIU
(Will) <liushucheng@huawei.com>


A new version of I-D, draft-gont-opsec-icmp-ingress-filtering-00.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.

Name:		draft-gont-opsec-icmp-ingress-filtering
Revision:	00
Title:		Network Ingress Filtering: Defeating Attacks which employ Forged
ICMP/ ICMPv6 Error Messages
Document date:	2014-08-28
Group:		Individual Submission
Pages:		9
URL:
http://www.ietf.org/internet-drafts/draft-gont-opsec-icmp-ingress-filtering-00.txt
Status:
https://datatracker.ietf.org/doc/draft-gont-opsec-icmp-ingress-filtering/
Htmlized:
http://tools.ietf.org/html/draft-gont-opsec-icmp-ingress-filtering-00


Abstract:
   Over the years, a number of attack vectors that employ forged ICMP/
   ICMPv6 error messages have been disclosed and exploited in the wild.
   The aforementioned attack vectors do not require that the source
   address of the packets be forged, but do require that the addresses
   of the IP/IPv6 packet embedded in the ICMP/ICMPv6 payload be forged.
   This document discusses a simple, effective, and straightforward
   method for using ingress traffic filtering to mitigate attacks that
   use forged addresses in the IP/IPv6 packet embedded in an ICMP/ICMPv6
   payload.  This advice is in line with the recommendations in BCP38.





Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat