Hi,

Some folks have expressed (both on-list and off-list) that they would
prefer a less agressive solution for the RA-Guard evasion vulnerability.
So I'd like to hear comments about the possible alternatives..

The current I-Ds (draft-gont-6man-nd-extension-headers and
draft-gont-v6ops-ra-guard-evasion) basically take this approach:

* Prohibit use of extension headers in ND messages. A host
implementation must not produce these packets, and must discard them if
it receives them
* This results in a RA-Guard implementation that is as simple as
possible (it only has to look at the header following the fixed IPv6
header).


A more relaxed approach would be as follows:
* Extension headers are allowed with ND messages.
* If the packet is fragmented, the upper-layer header (ICMPv6 in this
case) must be present in the first fragment (i.e., hosts must not
generate packets that violate this requirement, and must discard them if
they receive them).
* Possibly have the RA-Guard box enforce a limit on the maximum number
of extension headers that it will process (e.g., if after jumping to
the, say 10th header the upper-layer header is not found, drop the packet)
* This approach is less aggressive than the one proposed in the
aforementioned I-Ds (i.e., more flexibility), but of course would also
mean that the RA-Guard implementation would need to follow the header
chain, thus leading to increased complexity, and possible performance
issues.

Any comments/thoughts will be very much appreciated.

Thanks!

Best regards,
-- 
Fernando Gont
e-mail: ferna...@gont.com.ar || fg...@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1



--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to