Hi Pekka,

By 'goes through', do you also intermediate routers which are do not
need to process the routing header in any way (i.e.: are never in
"Destination Address" field of the routing header)?

If yes, this would require punting packets from hardware forwarding to
the control processor which is IMHO a non-starter.
Having a background on ASIC design for packet forwarding, I believe
that is exactly what is done for packets that need to be processed in
some exceptional behavior. Its a very very normal case. The other case
is to process the packets in the embedded processors, using some
firmware.

Can you explain why the above design is a non-starter?

Thanks,
Vishwas

On 6/3/07, Pekka Savola <[EMAIL PROTECTED]> wrote:
On Sun, 3 Jun 2007, Vishwas Manral wrote:
> The idea is that for every router the packet goes through, we need to
> check the IP address of all the interface addresses, and make sure
> that the none of the interface address either before or after in the
> source routing header match any of the IP address of the packet.

Not sure whether this is worth doing in the first place, but just to
get the story straight:

By 'goes through', do you also intermediate routers which are do not
need to process the routing header in any way (i.e.: are never in
"Destination Address" field of the routing header)?

If yes, this would require punting packets from hardware forwarding to
the control processor which is IMHO a non-starter.

> Yes RPF check could be helpful too. But I am unsure how it would
> behave in case of ECMP other other anomaly cases.

Maybe Jeroen meant to refer to ingress/egress filtering in general,
not just uRPF.  Strict uRPF is usually applied around the edges of the
network (where the size and definion of 'network' varies).  Other
kinds of ingress/egress ACLs (usually static / automatically generated
ones) can be better applied at peering/upstream/etc. borders.  Having
such ACLs prevents almost all RH0 looping abuse.  (There is a scenario
Gert Döring mentioned where you loop between backbone routers within
the target organization but that can be eliminated by disabling RH0
processing in that organization's routers' control plane).

--
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to