>>>>> On Fri, 02 Feb 2001 11:17:32 -0800,
>>>>> "T.J. Kniveton" <[EMAIL PROTECTED]> said:
>> In this case, we can reasonably assume that a new prefix (with positive
>> valid and preferred lifetimes) is being advertised. Thus, we have at
>> least one preferred address. Also, in the scenario above, the old
>> prefix is being advertised with zero lifetimes, the old address is
>> immediately deprecated (note that the "two hours" protection described
>> in RFC 2462 is not applied to preferred lifetime.) Consequently, we
>> would just use the (only) preferred address when we start a new
>> communication by the definition of the "deprecated" address, and would
>> not see any problems in a normal operation.
> OK, thanks, that is clearer.
> Isn't this still vulnerable to a desnial of service attack? If I only have
> one global address and a malicious node deprecates my address, I can not
> open any new connections. Granted, I can continue using the connections that
> are open, but it still prevents further communication. I would assume that
> whenever there are no valid prefixes, the node would send a router
> solicitation. But if the attacking node is fast, it can deprecate prefixes
> as soon as they're advertised.
If you only have one global address, you can just use the address even
if the address has been deprecated. RFC2462 says
A deprecated address SHOULD continue to be used as a source
address in existing communications, but SHOULD NOT be used in new
communications if an alternate (non-deprecated) address is available
and has sufficient scope.
(Section 5.5.4)
Note that the if-clause at the end of the sentence.
>>> Aside from whether this is "OK," there is inconsistency between these
>>> drafts. 2461 does not seem to account for the DoS attack which 2462 is
>>> trying to avoid.
>>
>> No, we don't care about zero-lifetime attack in prefix (i.e on-link)
>> manipulation, which RFC 2461 describes. We only care about the attack
>> that attemps to make a victim's *address* invalid.
>>
>> Note that we can still send packets to default routers even if we
>> don't have any known on-link prefixes, while we can't make any
>> off-link communications if all the global addresses are invalidated.
>>
>> Of course, you could say that this policy is "wrong", but at least the
>> two policies are not inconsistent.
> The distinction between deprecating a prefix and invalidating it was what I
> was missing in my read of the draft. I still see a problem vis a vis the
> zero-lifetime attack. Am I missing something?
Which zero-lifetime attack did you mean? For the address lifetime,
the attacker can only make the address deprecated. This is not a
significant attack as I said in the previous message and above. For
the prefix (on-link) lifetime, the attacker can make all the prefixes
of a victim off-link. However, since the victim still knows default
routers, it can just send packets to a router, and (if it is lucky
enough,) can make any on-link and off-link communications.
However, the attacker can also
- make all valid routers' lifetimes zero, or
- be a "blackhole" router.
I admit these attacks can be a real threat, and are diffcult to
protect.
JINMEI, Tatuya
Communication Platform Lab.
Corporate R&D Center, Toshiba Corp.
[EMAIL PROTECTED]
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page: http://playground.sun.com/ipng
FTP archive: ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------