Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop

"C. M. Heard" <heard@pobox.com> Sat, 20 October 2012 18:42 UTC

Return-Path: <heard@pobox.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E75921F846B for <v6ops@ietfa.amsl.com>; Sat, 20 Oct 2012 11:42:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BZpvXWuMTHcY for <v6ops@ietfa.amsl.com>; Sat, 20 Oct 2012 11:42:42 -0700 (PDT)
Received: from shell4.bayarea.net (shell4.bayarea.net [209.128.82.1]) by ietfa.amsl.com (Postfix) with ESMTP id 514C621F89CF for <v6ops@ietf.org>; Sat, 20 Oct 2012 11:42:40 -0700 (PDT)
Received: (qmail 11216 invoked from network); 20 Oct 2012 11:42:39 -0700
Received: from shell4.bayarea.net (209.128.82.1) by shell4.bayarea.net with (DHE-RSA-AES256-SHA encrypted) SMTP; 20 Oct 2012 11:42:39 -0700
Date: Sat, 20 Oct 2012 11:42:39 -0700
From: "C. M. Heard" <heard@pobox.com>
X-X-Sender: heard@shell4.bayarea.net
To: V6 Ops <v6ops@ietf.org>
In-Reply-To: <A08D31C1-5CF5-4380-851A-62F35FF11636@kumari.net>
Message-ID: <Pine.LNX.4.64.1210201134550.8388@shell4.bayarea.net>
References: <201210161245.q9GCj0i26478@ftpeng-update.cisco.com> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3A2@XCH-NW-01V.nw.nos.boeing.com> <507DA6A3.20807@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3C3@XCH-NW-01V.nw.nos.boeing.com> <507DAB13.2010704@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3CE@XCH-NW-01V.nw.nos.boeing.com> <507DDF8A.9010607@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF5AB@XCH-NW-01V.nw.nos.boeing.com> <BB219517-B488-4777-AE9C-35C57BE91263@kumari.net> <Pine.LNX.4.64.1210171337470.7337@shell4.bayarea.net> <AC530E99-4054-4B0A-9B5C-30F9EF4A530C@kumari.net> <20121018223121.28B2C2A0041D@drugs.dv.isc.org> <A08D31C1-5CF5-4380-851A-62F35FF11636@kumari.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 20 Oct 2012 18:42:43 -0000

On Fri, 19 Oct 2012, Warren Kumari wrote:
> Ah, sorry, I guess I was unclear -- the connection from the data 
> plane to the control plane is much much smaller than the data 
> plane interfaces. This means that I need to protect the CP / CP 
> interface by classifying and filtering / policing / rate-limiting 
> traffic before it hits the CP interface. This means that I need to 
> be able to examine the traffic to classify it. If I get a 
> fragment, I have no way of knowing what it is for, and so have no 
> way of knowing which rate-limiter to apply. This means I can a: 
> just drop it, b: guess at a classification, c: have a classifier 
> for all fragments or d: just accept all frags.
> 
> This is part of a more general problem -- if I have a router with 
> a 10G interface facing "the Internet"[0] and e.g a webserver 
> connected behind it with a 1G interface I'd like to make sure that 
> only port 80/443 traffic is vying for the limited bandwidth. As I 
> cannot reassemble on the router, I cannot classify what 
> non-initial fragments are to know if they should be allowed. Yes, 
> an attacker can (obviously) still DoS me with >1Gbps of traffic on 
> port 80, but at least I can filter out the stupid attacks on other 
> ports (which works surprisingly well :-P)

Circling back to my original comments about this draft, this is 
precisely the sort of information that needs to be added to Section 
2.1 to justify the assertion that "some cases will remain where 
legitimate fragments are discarded for legitimate reasons."

(FWIW, I am not sure that I agree that the reasons for discarding 
legitimate fragments are actually legitimate, but Warren Kumari's 
analysis does explain why some people do it.  It may or may not be 
in scope for the draft to suggest less destructive ways for 
operators to solve this class of problems.)

//cmh