> On Jan 23, 2015, at 11:28 AM, Graham Bartlett (grbartle) <[email protected]> 
> wrote:
> 
> Hi Paul
> 
> 
> Sorry for the late reply. Hopefully the following is more clear?
> 
> When designing systems which will provide connectivity for
> non-authenticated users, the system SHOULD be designed with the capacity
> to support not only the maximum intended number of peers, but also include
> an additional number of sessions which are created due to malicious or
> erroneous behaviour. This safety margin will allow a system to still
> operate safely under load until it is exceeded.

I understand the sentiment, but this seems like a recommendation that can’t be 
tested and can’t really be implemented either.  The trouble is that the number 
of malicious sessions is unbounded (and may be quite large in a DOS scenario).

It might be better simply to point out the limitations of the machinery: 
because authentication is not provided in this case, the receiving system has 
no way to distinguish legitimate peers from malicious ones.  As a result, a 
denial of service attack may prevent the intended number of legitimate peers 
from communicating.  Additional session (SA?) capacity may help in such cases.

My point is that this is definitely going to be a case of throwing some more 
resources at the problem in the hopes it’s enough, but no way to predict 
whether it’s good enough.  Because of that, “SHOULD” seems inappropriate, and a 
simple statement of the issue and the limitations of this new protocol is 
better.

        paul

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to