2010/2/2 Dusan Mudric <dmud...@avaya.com>:
> Hi,
>
> Is there a mechanism to protect against a denial of service attack using
> prefixes with very small Valid Lifetimes? RFC 2462, section 5.5.3 e) talks
> about it but does not seam to cover the scenario where:
>
> 1) A user defines a small Preferred and Valid Lifetimes (i.e., 10sec and
> 15sec), and
>
> 2) The initial Router Advertisement message has very small Preferred and
> Valid Lifetimes for a Prefix, and
>
> 3) The received Lifetime is equal to Stored Lifetime.

This sounds like privacy addresses, only on a shorter timescale.

>
> With the small lifetime, address expires quickly and is created soon after.
> Applications using this address go up and down periodically and get into
> trouble.

do you mean:
o attack on the router
o client side changes, so the server can't block the user's IP, since
it's changing 'rapidly'
o server side changes, so the server has to track also dns updates
such that the remote users/clients can continue to find the server
reliably

your problem statement is a tad vague.

-chris

> Have this issue already been addressed?
>
> Regards,
>
> Dušan Mudrić
>
> Software Architect
>
> Avaya
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
>
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to