Per,

your posting is insightful.

On enforcement of any measures: you are absolutely correct. SAVA, as a technical approach cannot change the outline of the political/sociological/economic discussion, nor should it aim to. The aim is to change the values of some of the parameters that get plugged into that discussion in such a way that the output changes.

For the scenario that you painted:

1. Forcing equipment vendors to make BCP038 the default behaviour of their equipment. This is a good idea at first glance and may well prove to be a good idea on deeper discussion as well. It has certainly cropped up in discussion in the SAVA context.

Note however that BCP038 is defined in such a way as to be implemented by an intelligent person on whatever equipment they may have in a network they understand. It is not defined in a way that is easily performed mechanically by equipment that does not think or know the design of the network it is part of. Nor is there any consensus today (mainly because it hasn't been dealt with in a standards forum) of what making BCP038 the default behaviour really means. I suspect most people who know their stuff would have a pretty good intuitive understanding but it needs to be defined so router vendors can implement it and operators know what to expect when they get the software load that implements it.

Thinking about what happens in the period after this feature becomes available, I can imagine that there would be quite a lot of effort required a network of the scale of the IPv4 Internet to accommodate a sudden change in the default behaviour of equipment. This is the reason why SAVA has taken the approach of dealing with IPv6 only. At the current level of deployment of IPv6, with a lot of the standards still pretty fluent, we can still conceive of significantly altering the behavior of routers in this way.

I would see a definition of how to make BCP038 compliant ingress filters the default behaviour for IPv6 routers as a definite candidate for a SAVA draft. It's definitely within the scope. (May also be within scope for existing WGs)

2. This would certainly make a difference. There is in fact software out there that can do this, freely downloadable from
http://spoofer.csail.mit.edu/
and if you follow some links you can see some very interesting and maybe even surprising details of where you need to be if you want to spoof source addresses.

3. This is also an area included within the SAVA framework. It is non-trivial, however. How do you know when you trust a domain to be SAVA compliant, and what can you and can't you do when you know that?

There is quite a large body of research around this topic in existence and many solutions proposed, some as research papers and some already in I-D format. To date we have been reticent to put forward too much detail about the proposed solution, first because the body is large and potentially confusing, second because we don't want to give the impression that all the answers have been canvassed already and hence discourage people with ideas from putting them forward and third because the solutions are irrelevant to the discussion in hand at the moment, which is to ascertain consensus on:

1. Does the forum consider spoofed source addressing to be a problem?

2. If Yes, does the forum consider it to be a problem that the IETF should address?

If the first two answers are in the affirmative, then we would wish to invite people to take part in the mailing list and if possible to attend a BoF to go to the next question:

3. Does the forum regard this as a problem as one that should be addressed by a WG within the IETF? (At this point some discussion of potential solutions is of course relevant because the test fails if no solution is possible or if there is nobody prepared to work on it.)

cheers,

Mark

Per Heldal wrote:
On Wed, 2006-09-20 at 01:06 +0800, Mark Williams wrote:
[snip]

A medicine that the patient is not taking cannot effect a cure.


Spot-on.
You may find any number of technical solutions to the problem, but it
won't help much unless the ops-community is prepared to enforce
implementation. I.e. it becomes a political issue more than a technical
one.

Imagine:

1. Operators agree to boycott equipment vendors who fail to make
BCP38-compliance the *default* behavior of their equipment.

2. A significant software supplier (e.g. OS vendor) including spoofing
probes in their SW. You can't reliably test BCP38 compliance of remote
networks unless probes are deployed within the tested network. Imagine
every internet-attached PC or MAC probing a couple times a year. That
should give a decent indication of which networks do allow spoofing or
not.

3. Transit-operators filter "spoofing-friendly" prefixes from
routes-received until the problem is fixed.

This could eliminate spoofing, with of without SAVA. The remaining
question is whether the ISP-industry is prepared to implement this kind
of self-regulation before influential but less-clued elements impose
measures that may be a lot more destructive.


SAVA may prove good for the future, but it'll take years for any
standard defined today to find its way to all corners of the net, and
for all non-compliant legacy equipment to be removed.

 //per

--
"Product roadmap and/or product discussion in this email set forth
Juniper Networks' current intention and is subject to change at any
time without notice.  No purchases are contingent upon Juniper
Networks delivering any feature or functionality expressed or implied
in this roadmap or product discussion."
-----------------------------------------------------------------
Mark Williams                        Juniper Networks
Liaison                              Beijing Office
Academic Networking Sector           Tel: +86 10 6528 8800 x16032
Asia Pacific                         FAX: +61 7 3251 0155
[EMAIL PROTECTED]                      Cell: +86 1370-111-4749

_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to