Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop

Joe Touch <touch@isi.edu> Thu, 01 November 2012 18:25 UTC

Return-Path: <touch@isi.edu>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C00021F926A for <v6ops@ietfa.amsl.com>; Thu, 1 Nov 2012 11:25:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.885
X-Spam-Level:
X-Spam-Status: No, score=-104.885 tagged_above=-999 required=5 tests=[AWL=1.714, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZccO+pOvYE2N for <v6ops@ietfa.amsl.com>; Thu, 1 Nov 2012 11:25:53 -0700 (PDT)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) by ietfa.amsl.com (Postfix) with ESMTP id 9C16721F8994 for <v6ops@ietf.org>; Thu, 1 Nov 2012 11:25:53 -0700 (PDT)
Received: from [128.9.160.166] (abc.isi.edu [128.9.160.166]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id qA1IPN79024136 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 1 Nov 2012 11:25:23 -0700 (PDT)
Message-ID: <5092BE93.9090809@isi.edu>
Date: Thu, 01 Nov 2012 11:25:23 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20121026 Thunderbird/16.0.2
MIME-Version: 1.0
To: Lorenzo Colitti <lorenzo@google.com>
References: <CAKD1Yr13cNspdWvTaXxHt4R_8UB-CKeA4nq8_XWrkbFGCgW7Gg@mail.gmail.com> <5090DECF.3050100@gmail.com> <CAKD1Yr1dUy-f78A2+kfA7NjpzD0WQRT8iwqGYAm5A=Erodpn-A@mail.gmail.com> <20121031.122110.41655699.sthaug@nethelp.no> <50910E41.2030100@gmail.com> <CAKD1Yr0mTTcVeq+Qf0fLv3UCBP_90QmStkK3Ha4tDdm3FxJjVA@mail.gmail.com> <50915F86.7050304@gmail.com> <509165B8.404@si6networks.com> <509169C2.9040208@isi.edu> <50916F21.6030303@si6networks.com> <509174F1.8080809@isi.edu> <50924264.7040300@gmail.com> <76E349F3-6022-4042-9B44-57507593B8DE@employees.org> <CAKD1Yr3WOET7o9Ke5NO0p70dBZ+UbMUD4xR5ZvP7SYyNcdL0vw@mail.gmail.com>
In-Reply-To: <CAKD1Yr3WOET7o9Ke5NO0p70dBZ+UbMUD4xR5ZvP7SYyNcdL0vw@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: Fernando Gont <fgont@si6networks.com>, v6ops@ietf.org
Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Nov 2012 18:25:54 -0000

On 11/1/2012 4:55 AM, Lorenzo Colitti wrote:
> On Thu, Nov 1, 2012 at 8:16 PM, Ole Trøan <otroan@employees.org
> <mailto:otroan@employees.org>> wrote:
>
>     I don't see how we can build protocols to accommodate middle boxes,
>     and we have already done RFC3514.
>
>
> I'm sorry, but there are real operational needs here.
>
> Here's an example: suppose I am under attack by a TCP SYN flood and want
> to rate-limit it or filter it out so I can process legitimate traffic.
 >
> It would be reasonable for me to want to do this on a peering router,
> because it's as close as possible to the source, and it's a
> high-capacity, scalable box that needs to process each packet anyway.
 >
> I don't want to carry tens of gigabits of useless attack packets all the
> way the way through the network to the end host, and overwhelm it, so I
> can drop them there. And I also don't want to put stateful firewalls at
> each peering connection, because the firewalls cost a lot of money, take
> up space in POPs and connecting them wastes expensive ports on peering
> routers.
>
> The right way to deal with this is to rate-limit or drop on the
> routers. You're saying the architecture doesn't allow this? Then I'm
> sorry, but we need a better architecture.

The "right way" is to drop them at the offending source, but I hope we 
all agree we cannot do that because there's no viable solution.

The architecture already allows the router to shed load by dropping 
packets either arbitrarily or per-destination. However, you want to 
preferentially drop these at your ingress router, but there's no viable 
solution there that doesn't require stateful firewalls.

So your conclusion is that the architecture is broken.

If you have a better architecture - one that also supports tunnels, 
which are ubiquitous now too - it might be useful to disclose it.

Otherwise, it might be time to admit that you can't always get what you 
want.

Joe