I agree this is a DOS attack vector, but is it any worse than the TCP SYN
attack vector, and any reason it can't be mitigated similarly with some
rate control?  Yes, a naively defined ICMP message would be really bad, but
I think a carefully defined one could work.

Another possible mittigation, only accepting the ICMP message form sources
within the same /48 as the host receiving the message, combine this with
BCP-38 filtering and you have drastically limited the scope of who could
launch such a DOS attack. This requires the captive portal redirector, not
necessarily the captive portal itself, to be within the same /48, but that
doesn't seem like its too onerous of a requirement.  You could make it the
same /64, but that might be too restrictive in some larger scale captive
portal implementations.

Thanks.
_______________________________________________
Captive-portals mailing list
Captive-portals@ietf.org
https://www.ietf.org/mailman/listinfo/captive-portals

Reply via email to