Re: IPv6 packets with HBH

2014-08-07 Thread Fernando Gont
Hi, Yannis,

On 07/04/2014 12:05 PM, Yannis Nikolopoulos wrote:
 
 how do people handle packets with HBH present? Since their use is a
 potential attack vector, do people rate-limit them? I can't seem to find
 some sort of best practice on the issue

This is the current state of affairs on the public IPv6 Internet:
http://www.iepg.org/2014-07-20-ietf90/iepg-ietf90-ipv6-ehs-in-the-real-world-v2.0.pdf

Thanks!

Cheers,
-- 
Fernando Gont
e-mail: ferna...@gont.com.ar || fg...@si6networks.com
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1





AAAA records (was: Re: IPv6 packets with HBH)

2014-08-07 Thread Jens Link
Fernando Gont ferna...@gont.com.ar writes:

Hi,

 This is the current state of affairs on the public IPv6 Internet:
 http://www.iepg.org/2014-07-20-ietf90/iepg-ietf90-ipv6-ehs-in-the-real-world-v2.0.pdf

After reading slide 7 I decided to take a closer look at those funny 
IPv6  addresses. I used host to get  record for the Alexa Top
1Milion domains, and after a lot of DNS lookups I found the following:

70502 GLOBAL-UNICAST
94 IPV4MAP
50 LOOPBACK
49 LINK-LOCAL-UNICAST
30 RESERVED (including 9 RFC 3849 (2001:db8)  addresses)
19 IPV4COMP
5 UNSPECIFIED
1 UNIQUE-LOCAL-UNICAST

I planing to modify my script to look for 6to4 and teredo, speed up DNS
lookups and maybe adding www to any Domain without a  record and
runs these test on a monthly base. Any more ideas?

Jens
-- 

| Foelderichstr. 40   | 13595 Berlin, Germany   | +49-151-18721264 |
| http://blog.quux.de | jabber: jensl...@jabber.quux.de | ---  | 



Re: IPv6 packets with HBH

2014-08-07 Thread Ole Troan
Fernando,

 how do people handle packets with HBH present? Since their use is a
 potential attack vector, do people rate-limit them? I can't seem to find
 some sort of best practice on the issue
 
 This is the current state of affairs on the public IPv6 Internet:
 http://www.iepg.org/2014-07-20-ietf90/iepg-ietf90-ipv6-ehs-in-the-real-world-v2.0.pdf

s/public IPv6 Internet/selected content providers/

advice with regards to HBH headers. assuming there isn't any feature enabled 
that uses HBH. on a platform that supports forwarding of packets with HBH 
without punting, forward. for platforms that do punt regardless, drop.

cheers,
Ole

Re: IPv6 packets with HBH

2014-07-18 Thread Yannis Nikolopoulos

Eric,

thanks for your comments

On 07/09/2014 12:47 PM, Eric Vyncke (evyncke) wrote:

Yannis

While I cannot speak for all vendors or even for all of my employer's
products, you will indeed find that control-plane policing (=
rate-limiting) is either on by default or can be configured on most
routers.

Alternatively, you may want to use plain ACL to drop all those
potentially-harmful packets with HbH.

You probably know that HbH is also used on the local link for MLD and on
the WAN for RSVP (and possibly for other purposes). So, be sure to
understand your own use before configuring drop/rate limiting ;-)

Rate-limiting is really the way to go IMHO. A platform which processes HbH
without rate-limiting (and there are such platforms) should NOT be
deployed on the wild Internet.


maybe I should forward this last comment (with which I agree) to our 
local Cisco team ;)


cheers,
Yannis


Hope that this belated reply helps

-éric


On 5/07/14 15:27, Yannis Nikolopoulos d...@otenet.gr wrote:


On 07/04/2014 11:43 PM, Brian E Carpenter wrote:

On 05/07/2014 04:05, Yannis Nikolopoulos wrote:

hello,

how do people handle packets with HBH present? Since their use is a
potential attack vector, do people rate-limit them? I can't seem to
find
some sort of best practice on the issue

I have the impression that they are simply ignored in many cases.
That is simpler than rate-limiting. It is legal, because we reduced
the requirement to processing them to a SHOULD in RFC 7045:

 The IPv6 Hop-by-Hop Options header SHOULD be processed by
 intermediate forwarding nodes as described in [RFC2460].  However,
it
 is to be expected that high-performance routers will either ignore
it
 or assign packets containing it to a slow processing path.
Designers
 planning to use a hop-by-hop option need to be aware of this likely
 behaviour.

That sounds fine and it would make our lives easier but...

I'm note sure about other vendors, but it seems that Cisco boxes are
processing those at each node, at least it seems that ASR9k and 7600 do
(although there's the option to rate-limit them). CRS probably rate
limit them by default but the info is quite scarce

cheers


   - Brian


cheers,
Yannis





Re: IPv6 packets with HBH

2014-07-18 Thread Brian E Carpenter
You-all might want to hop over to IETF-land to comment on
http://tools.ietf.org/html/draft-gont-opsec-ipv6-eh-filtering

Regards
   Brian

On 19/07/2014 07:45, Yannis Nikolopoulos wrote:
 Eric,
 
 thanks for your comments
 
 On 07/09/2014 12:47 PM, Eric Vyncke (evyncke) wrote:
 Yannis

 While I cannot speak for all vendors or even for all of my employer's
 products, you will indeed find that control-plane policing (=
 rate-limiting) is either on by default or can be configured on most
 routers.

 Alternatively, you may want to use plain ACL to drop all those
 potentially-harmful packets with HbH.

 You probably know that HbH is also used on the local link for MLD and on
 the WAN for RSVP (and possibly for other purposes). So, be sure to
 understand your own use before configuring drop/rate limiting ;-)

 Rate-limiting is really the way to go IMHO. A platform which processes
 HbH
 without rate-limiting (and there are such platforms) should NOT be
 deployed on the wild Internet.
 
 maybe I should forward this last comment (with which I agree) to our
 local Cisco team ;)
 
 cheers,
 Yannis
 
 Hope that this belated reply helps

 -éric


 On 5/07/14 15:27, Yannis Nikolopoulos d...@otenet.gr wrote:

 On 07/04/2014 11:43 PM, Brian E Carpenter wrote:
 On 05/07/2014 04:05, Yannis Nikolopoulos wrote:
 hello,

 how do people handle packets with HBH present? Since their use is a
 potential attack vector, do people rate-limit them? I can't seem to
 find
 some sort of best practice on the issue
 I have the impression that they are simply ignored in many cases.
 That is simpler than rate-limiting. It is legal, because we reduced
 the requirement to processing them to a SHOULD in RFC 7045:

  The IPv6 Hop-by-Hop Options header SHOULD be processed by
  intermediate forwarding nodes as described in [RFC2460].  However,
 it
  is to be expected that high-performance routers will either ignore
 it
  or assign packets containing it to a slow processing path.
 Designers
  planning to use a hop-by-hop option need to be aware of this
 likely
  behaviour.
 That sounds fine and it would make our lives easier but...

 I'm note sure about other vendors, but it seems that Cisco boxes are
 processing those at each node, at least it seems that ASR9k and 7600 do
 (although there's the option to rate-limit them). CRS probably rate
 limit them by default but the info is quite scarce

 cheers

- Brian

 cheers,
 Yannis

 
 



Re: IPv6 packets with HBH

2014-07-09 Thread Eric Vyncke (evyncke)
Yannis

While I cannot speak for all vendors or even for all of my employer's
products, you will indeed find that control-plane policing (=
rate-limiting) is either on by default or can be configured on most
routers.

Alternatively, you may want to use plain ACL to drop all those
potentially-harmful packets with HbH.

You probably know that HbH is also used on the local link for MLD and on
the WAN for RSVP (and possibly for other purposes). So, be sure to
understand your own use before configuring drop/rate limiting ;-)

Rate-limiting is really the way to go IMHO. A platform which processes HbH
without rate-limiting (and there are such platforms) should NOT be
deployed on the wild Internet.

Hope that this belated reply helps

-éric


On 5/07/14 15:27, Yannis Nikolopoulos d...@otenet.gr wrote:

On 07/04/2014 11:43 PM, Brian E Carpenter wrote:
 On 05/07/2014 04:05, Yannis Nikolopoulos wrote:
 hello,

 how do people handle packets with HBH present? Since their use is a
 potential attack vector, do people rate-limit them? I can't seem to
find
 some sort of best practice on the issue
 I have the impression that they are simply ignored in many cases.
 That is simpler than rate-limiting. It is legal, because we reduced
 the requirement to processing them to a SHOULD in RFC 7045:

 The IPv6 Hop-by-Hop Options header SHOULD be processed by
 intermediate forwarding nodes as described in [RFC2460].  However,
it
 is to be expected that high-performance routers will either ignore
it
 or assign packets containing it to a slow processing path.
Designers
 planning to use a hop-by-hop option need to be aware of this likely
 behaviour.
That sounds fine and it would make our lives easier but...

I'm note sure about other vendors, but it seems that Cisco boxes are
processing those at each node, at least it seems that ASR9k and 7600 do
(although there's the option to rate-limit them). CRS probably rate
limit them by default but the info is quite scarce

cheers


   - Brian

 cheers,
 Yannis





Re: IPv6 packets with HBH

2014-07-05 Thread Brian E Carpenter
On 06/07/2014 01:27, Yannis Nikolopoulos wrote:
 On 07/04/2014 11:43 PM, Brian E Carpenter wrote:
 On 05/07/2014 04:05, Yannis Nikolopoulos wrote:
 hello,

 how do people handle packets with HBH present? Since their use is a
 potential attack vector, do people rate-limit them? I can't seem to find
 some sort of best practice on the issue
 I have the impression that they are simply ignored in many cases.
 That is simpler than rate-limiting. It is legal, because we reduced
 the requirement to processing them to a SHOULD in RFC 7045:

 The IPv6 Hop-by-Hop Options header SHOULD be processed by
 intermediate forwarding nodes as described in [RFC2460].  However, it
 is to be expected that high-performance routers will either ignore it
 or assign packets containing it to a slow processing path.  Designers
 planning to use a hop-by-hop option need to be aware of this likely
 behaviour.
 That sounds fine and it would make our lives easier but...
 
 I'm note sure about other vendors, but it seems that Cisco boxes are
 processing those at each node, at least it seems that ASR9k and 7600 do
 (although there's the option to rate-limit them). CRS probably rate
 limit them by default but the info is quite scarce

It's for router vendors to comment, but the RFC is very recent so
it will be a while before we can expect products to be changed.
If everybody makes a feature request to their vendors along the
lines of option to disable HBH processing as allowed by RFC 7045
something might happen.

Brian


Re: IPv6 packets with HBH

2014-07-04 Thread Brian E Carpenter
On 05/07/2014 04:05, Yannis Nikolopoulos wrote:
 hello,
 
 how do people handle packets with HBH present? Since their use is a
 potential attack vector, do people rate-limit them? I can't seem to find
 some sort of best practice on the issue

I have the impression that they are simply ignored in many cases.
That is simpler than rate-limiting. It is legal, because we reduced
the requirement to processing them to a SHOULD in RFC 7045:

   The IPv6 Hop-by-Hop Options header SHOULD be processed by
   intermediate forwarding nodes as described in [RFC2460].  However, it
   is to be expected that high-performance routers will either ignore it
   or assign packets containing it to a slow processing path.  Designers
   planning to use a hop-by-hop option need to be aware of this likely
   behaviour.

 - Brian

 cheers,
 Yannis