I sent a comment to ICMPv6 update draft during IETF meeting and received
a few comments but not quite a discussion. Here is somewhat extreme
example of the DoS attack vulnerability I'm worried about:

Imagine, one day man is landing on Mars and real-time video is
multicasted on Internet. There are 100 million listeners on the
group. The multicast group is any-source group using embedded RP
address. The video quality is not perfect and one listener decides to
debug the problem. He sends a ICMPv6 Echo Request packets to the group
address without thinking beforehand.  As the group is any-source
group, the host is allowed to send packets.  Packet gets delivered to
the RP that sends it through the multicast tree.

Current ICMPv6 specification states at Chapter 4.2 Echo Reply Message:

"An Echo Reply SHOULD be sent in response to an Echo Request message
sent to an IPv6 multicast or anycast address."

The consequence is that the original Echo Request packet gets 100 000
000 unicast Echo Reply messages back.

Ping to multicast address has operational usage as debugging tool and
totally disabling reply to Echo Request message sent to an IPv6
multicast address would not be a good solution.

I see two alternatives to limit the Echo Reply to multicast packet
problem:
1. Limit Echo Reply packet to only be allowed on link-scope multicast
  echo requests.
2. Require that hop-limit is set to for instance value 1 for the
  Echo Reply packet.

I find the latter alternative is better as this way also global scope
multicast groups may be debugged still although the echo reply will be
discarded by the first router.

Message sent to anycast address should only cause one reply message
and that should not be problematic.

I propose changing chapter 4.2 Echo Reply Message paragraph:

  An Echo Reply SHOULD be sent in response to an Echo Request message
  sent to an IPv6 multicast or anycast address.  In this case, the
  source address of the reply MUST be a unicast address belonging to
  the interface on which the Echo Request message was received.

to:

  An Echo Reply SHOULD be sent in response to an Echo Request message
  sent to an IPv6 multicast address and the Hop-Limit IPv6 header
  field MUST be set to value 1.

  If Echo Reply message is sent in responce to an Echo Request
  message sent to an IPv6 multicast or anycast address, the source
  address of the reply MUST be a unicast address belonging to the
  interface on which the Echo Request message was received.

Perhaphs in practice the hop-limit could be somewhat bigger than 1 without
real problems?
---
Jyrki Soini

--------------------------------------------------------------------
IETF IPv6 working group mailing list
[EMAIL PROTECTED]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to