A quite alternate solution of this problem is to come up with what I would
like to call "cascade forwarding": The DSLAMs of may be 11 % of
the requesting users add their (new) capability whether they can
be branching node for cascading down by e.g. 10. The overloaded server
selects the request it receives within some timeframe and sends out a list
of the requesting users and DSLAMs. Based on its individual position
within the list each capable DSLAM is able to forward this and the following
packets such that all will get to 100 % of the users.
The workload of any branching node is well confined - and the
malicious service attacks will stop: Because they cannot do any harm to any
specific server anymore.
Heiner Hummel
In einer eMail vom 19.09.2006 19:11:50 Westeuropäische Normalzeit schreibt
[EMAIL PROTECTED]:
The
issue is not whether BCP38 works or not if applied. It does, and that is
not in dispute.
The issue is whether it will ever be applied in its
current form in enough places to make enough difference. As things are, it
doesn't look as if it will be. Recommended source filters have been around
for more than a decade now - I remember applying them to my network back
in the first half of the 1990s. Despite this we still have a situation
where approaching a quarter of the endpoints in the Internet can get a
spoofed source address into the network. There are several attacks out
there that require a spoofed source address, and many more that are much
harder to shut down if they do use spoofed source addresses. What's more
there are zombies out there that can detect the ability to use spoofed
source addresses and operate accordingly.
A medicine that the
patient is not taking cannot effect a cure.
One area of focus for SAVA
is to actually create stronger incentives to operators to apply source
filters. A second focus is to come up with a system which works if
coverage does not approach 100%. BCP38 does not work because if 25% of the
network is not covered, then the blackhats can just choose where to launch
the attack from.
SAVA does not claim to be aiming to solve every
security problem in today's Internet. It is looking to significantly
reduce one kind of threat.
I think there are three questions that need
to be asked here:
1. Does the ability to insert packets with spoofed
source addresses into the Internet represent a threat? (I think it
does).
2. Are there measures currently in use that look likely to solve
the problem? (I think not, but agree there are measures that would work if
incentive to deploy could be made sufficiently great.)
3. Would it
be a good thing if there was a coordinated effort to improve the situation
for IPv6 while it is still at a low level of deployment? (I think it
would.)
cheers,
Mark
Barry Greene (bgreene)
wrote: > > What you described is BCP38. OK. Done. > >
Everything else are techniques/features/functions to implement BCP38.
We > know that BCP38 works. We've got a lot of experience with it and
there > has been a lot of innovation to enhance BCP38 (BCP38 ++) so that
you > "know" the source address came from an authorized source (i.e. in
the > world of Cable and ETTX/Metro/Carrier Ethernet). > >
So back what is the point of Sava? I'm not seeing anything new?
Pekka's > worked on an BCP 38 experiences docs. RIPE is working on a
BCP38 config > guide. > > > > > -----Original
Message----- > > From: Ron Bonica
[mailto:[EMAIL PROTECTED] > > Sent: Thursday, September 14, 2006
1:07 PM > > To: Pekka Savola > > Cc: Jun Bi;
[EMAIL PROTECTED]; [EMAIL PROTECTED]; > >
[EMAIL PROTECTED] > > Subject: Re: [SAVA] Re: [Int-area]
Call For Participation and > > Interest: Source Address Validation
Architecture (SAVA) > > > > Pekka, > > > >
You raise some very fundamental questions about SAVA. I will > > try
to enumerate and answer them. If I get any of the answers > > wrong,
I invite the SAVA contributors to step up and correct me. > > >
> First, you ask what it means for a packet to have a "valid > >
source address". It means that there is some degree of > > certainty
that the packet originated at a site to which the > > address was
assigned by a legitimate numbering authority. > > This is a much
stronger statement than an alternative > > definition, which claims
only that the packet is not spoofing > > some well known address (for
example, one of your own > > backbone addresses). >
> > > The degree of certainty that source address filtering
and > > uRPF can provide is inversely proportional to the number
of > > hops between the validating and originating devices.
So, > > (although this might be anticipating solutions), the
SAVA > > architecture will probably include a source address >
> filtering/uRPF component that will be implemented by upstream >
> routers, and a signature component, by which the upstream > >
router notifies downstream routers that validation has (or > > has
not) occurred. > > > > Next, you ask what network resource
are protected by SAVA. I > > think that the answer is the entire
Internet, but especially > > the routers that are close to the
validating nodes. This is > > because SAVA can identify all of the
following classes of > > spoofed packets: > > > >
a) spoofed packets that are bound for routers (in the local > > or
remote AS) > > b) spoofed packets that are bound for hosts, but cause
router > > interfaces to congest. > > > >
Ron > > >
> > > > > > >
_______________________________________________ > >
routing-discussion mailing list > >
[EMAIL PROTECTED] > >
https://www1.ietf.org/mailman/listinfo/routing-discussion >
> > > _______________________________________________ >
SAVA mailing list > [EMAIL PROTECTED] >
http://www.nrc.tsinghua.edu.cn/mailman/listinfo/sava >
--
"Product roadmap and/or product discussion in this email set
forth Juniper Networks' current intention and is subject to change at
any time without notice. No purchases are contingent upon
Juniper Networks delivering any feature or functionality expressed or
implied in this roadmap or product
discussion." ----------------------------------------------------------------- Mark
Williams
Juniper Networks Liaison
Beijing
Office Academic Networking Sector
Tel: +86 10 6528 8800 x16032 Asia Pacific
FAX: +61 7 3251
0155 [EMAIL PROTECTED]
Cell: +86
1370-111-4749
_______________________________________________ routing-discussion
mailing
list [EMAIL PROTECTED] https://www1.ietf.org/mailman/listinfo
|
_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area