On Jun 8, 2007, at 1:20 AM, Jari Arkko wrote:

Are you thinking of the router making an extra SEND operation to verify ownership when it for the first time sees a packet? It could send an NS and verify the resulting NA. And use this for the forwarding decision.

This would not, however, prevent someone who can forge L2 source addresses from claiming that an IP packet came from a host. So for a full solution I guess you would also need to enforce L2 source addresses, either through switch configuration or L2 security.

In a network with a switch, the switch can do a number of things that are very helpful, including suppress non-conforming traffic. Or so the Catalyst people tell me :-). In a wireless network, at least according to my limited understanding of 802.11 and 802.16 radio technologies, the access point potentially schedules use of the air segment (that is itself a configuration thing - most have the end systems doing that using RTS/CTS for larger datagrams) but doesn't act as a switch unless the datagram actually has to traverse to another LAN domain for delivery.

Yes, one could readily imagine having the receiving host or router reply to a datagram from an unknown source by dropping the datagram (there is a ddos vector here, and holding the datagram is a second ddos vector) and replying with a solicit, expecting that the sender will now reply to the solicit and repeat the original datagram.

e2e, and noting that many implementations do in fact drop a datagram that they can't immediately forward due to the implied ddos on the network if they don't, this means that there is some probability that a TCP session between systems aggressively using privacy addresses could easily only get a SYN-ACK response to the third SYN, and only get the SYN-ACK to traverse e2e on the fourth or fifth. The algorithm of dropping the datagram that triggers a solicit also has a ddos in it, which those who build routers argue is a rare case and so not statistically valuable to chase.


_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to