I may be missing something. Maybe something imp0ortant. But pretneding for the moment that I understand this discussion...

Fundamentally, if a subscriber DoS' himself, and denies himself service, then he hurts himself. So?

Now, there do need to be ways that this is prevented from hurting the rest of the system. But there are already specified rate limits.

Even for an enterprise, if a device within the enterprise DoS' the enterprise, then the enterprise has to deal with it. One may want additional protections, but they are largely a local, implementation, matter.

There is one case that is, I think, important, but fairly easily dealt with. There are Proxy ITRs in the system. Those end up accepting traffic from wide ranges of soruces for wide ranges of destinations (depending upon which PITR deployment model you find useful.) Those would seem to be vulnerable to DoS. However, those are few, far between, and could reasoanbly be specialized boxes. If they participate in the ALT, for example, they presumably can finess a number of the implications of scatter attacks via clever implementation.

Yours,
Joel

On 7/18/2011 4:07 PM, Noel Chiappa wrote:
     >  From: Jeff Wheeler<[email protected]>

     >  any subscriber access platform, must be able to deal with the threat
     >  of DoS attacks.

I definitely agree with this, and I've been pondering it a bit over the
last couple of days. (BTW, do you forsee this being an issue for IPv4 and
IPv6, or 'mostly' an IPv6 issue, because of the very large address space?)
_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to