In your previous mail you wrote:

   AAA for IPv6 is, indeed, quite another problem domain, and
   one for which we've hardly started considering the issues. 
   
=> Jari meant network access control, not full AAA with AAA infrastructure.

   Furthermore, I am quite reluctant to get
   embroiled in a design discussion about building ingress filtering
   routers (notwithstanding (*) below), when what I really want to
   do is to move the Mobile IPv6 specification forward.
   
=> I agree, the ingress filtering stuff should be dealt with in parallel.

   In an effort to be constructive, here are some further ideas about
   how to limit the damage from the packet reflection which can be
   caused by malicious use of unrestricted HAOs.
   
   1) The correspondent node can strictly limit the number of
      care-of addresses available to any one home address (to,
      say, one or two).  It _could_ even do so for the number
      of care-of addresses assignable to home addresses on a
      particular subnet, if we wanted to go to the trouble of
      putting the prefix length back into the Binding Update.
   
=> I don't believe in defense at CNs with triangular routing,
I am afraid this will catch only buggy attacks.

   2) The ingress filtering router can strictly limit the number
      of HAOs transmitted from any particular subnet prefix
      per unit time (*).
   
=> this can be useful in order to detect abnormal situations
(i.e. attacks) but not to fix them (it is too hard to distinguish
between legitimate and fake HAOs so the system can be itself
the target of a DoS attack).
The best passive protection is BU/BA snooping (all interesting
parameters are in the exchange and BAs are easy to check) but
if it is effective when possible (no too much ciphered fields,
snooping devices in the path), I personnaly prefer more active
schemes (mainly because they give far better proofs in the legal
meaning... but I believe firewall people prefer snooping which is
more common in their context).
BTW I've interpreted your statement as the number of *different* HAOs
transmitted...

   These are the first things that come to mind, and I believe
   they are quite simple to implement.   (1) certainly is.
   Plus, I believe that, for the purposes of handling HAOs,
   we should begin to distinguish between home addresses that
   have security associations established with the correspondent
   node, and home addresses that do not.  It is the latter
   variety that need to have the strict numerical limitations.
   
=> with current specs a MN must have a home registration with is
always acknowledged so BU/BA snooping is the next step of your idea.

Regards

[EMAIL PROTECTED]
--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to