On Thu, May 10, 2007 at 05:49:14PM +0300, Pekka Savola wrote:
> On Thu, 10 May 2007, Jeroen Massar wrote:
> >As such, when you are a transit provider, and you have on the edges of
> >your network some vulnerable hosts, those hosts can be used to apply
> >this attack to your network.

> >The documentation should thus specify that, where possible, RH0 should
> >be filtered at customer borders.
> 
> Well, IMHO that's a bit unnecessary.

I think this worse than unnecessary - it is probably harmful. If
filtering is recommended then some proportion of people will filter
all routing headers and use this recommendation as a justification
for it. Then we'll be backed into a corner where we can't replace
RH0 with something safe and we we also break the mobility stuff.

> If you see packet ping-pong on the Internet, it's an indication that 
> ingress and egress filters haven't been adequately set up.  Adding 
> those will stop your network's bandwidth being wasted.

> Maybe this RH0 vulnerability will turn out for the good after all if 
> it means better BCP38/84 deployment :-)

Indeed - ISPs would be much better implementing BCP38/84.

        David.

--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to