Re: game over, EH [Tsvart last call review of draft-ietf-opsec-ipv6-eh-filtering-06]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Dec 6, 2018 at 1:32 AM Gert Doering <gert@xxxxxxxxx> wrote:
> On Thu, Dec 06, 2018 at 01:14:54PM +1300, Brian E Carpenter wrote:
> > > Which implies that as soon as the evil guys out there find a way to
> > > generate DDoS streams carrying EHs that our border routers will (have to)
> > > apply very strict rate limiting to everything they do not understand.
> > >
> > >  - pass TCP
> > >  - rate-limit UDP on well-known reflective attacks port
> > >  - pass rest of UDP
> > >  - rate-limit ICMP
> > >  - rate-limit fragments
> > >  - rate-limit all the rest to something which can never exceed a
> > >    customer's access-link
> > >
> > > game over, EH
> >
> > Just to point out that this is equivalent to saying "game over,
> > any new layer 4 protocol" too. For example, you just killed SCTP.
> > And the same goes for new protocols over IPv4.
>
> Well.  Since nobody is using SCTP, it can nicely live in the
> "rate-limit all the rest to something ..." bucket...
>
> But yes, "any new layer 4 protocol" is likely to not work in an Internet
> that is basically full of hostile packets *in high volumes*.
>
> Trying to run large volume traffic over UDP/443 is going to be the next
> excercise in "operators told you that is isn't going to work"...

Is that a prediction, or a self-fulfilling prophecy? I would certainly hope
that filtering UDP/443 is not done preemptively without actual evidence that
it is in fact a DDoS vector.

Mike Heard




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux