Hi Joel,

I've been and am in the middle of starting a new job and moving
inter-state over the last few weeks, so I haven't been able to spend as
much time on this as I'd have liked to, as I'm quite interested in this
issue being resolved. I haven't had a chance, and won't over the next
few weeks to thoroughly read the draft, hopefully below is useful.

I have been working on my own proposal to address this issue by
abandoning the state held during the NS/NA transaction, and relying on
the traffic originating hosts to retransmit their NS/NA triggering
traffic if the stateless NS/NA transaction fails.

On Sun, 7 Aug 2011 10:57:45 -0700
Joel Jaeggli <joe...@bogus.com> wrote:

> Greetings,
> 
> This is followup from our discussion in both v6ops and 6man. We got a lot of 
> useful input, but I would like to ask the mailing list to see if we can 
> solidify this into a course of action.
> 
> For reference:
> 
> ftp://ftp.ietf.org/internet-drafts/draft-gashinsky-v6nd-enhance-00.txt
> 
> http://tools.ietf.org/agenda/81/slides/6man-9.pdf
> 
> 
> 1. Is this document (draft-gashinsky-v6nd-enhance) worthwhile?
> 

Yes

> 2. Is there critique of the two proposed 4861 changes?
> 
>       A. 7.3  NDP Protocol Gratuitous NA
> 
>               a. We believe the is the question is whether the technique 
> would 
>               be useful under duress, wether it is potentially dangerous,
>               if the safeguards are adequate, etc.
> 
>       B. 7.4 ND cache priming and refresh
> 

Haven't had the chance to thoroughly understand them yet.

> 3. Should we separate the potential mitigations (section 6) and 
> implementation advice (section 7.1 and 7.2) into a separate document.

Yes. 

> 
>       A. Assumption (validated in v6ops at ietf81) is that v6ops would be 
> happy
>        to take the mitigation and implementation advice as an informational 
> document
> 
>       B. Assumption 2 a draft updating 4861 would be a standards track 
> document.
> 
>       C. Assumption 3, should harmonize with  
> draft-nordmark-6man-impatient-nud-00
> 
> 4. Is there anyone who thinks that an update to 4861 to address dos exposure 
> is unnecessary?
> 

I think this issue is essential to address. The end-users of the
Internet, and the services/applications they use, usually reside on
LANs, and LANs are vulnerable to this attack. The /127 or similar
techniques aren't applicable to LANs or point-to-point links such as SP
residential subscriber PPP/PPPoE sessions. A general method to resolve
this issue for all links, regardless of their role in the network or
their type should be the goal.

>       A. Just publish the advice and be done with it?
> 
> Comments on some or all of these questions would help the authors decide 
> where to go next.
> 
> Thanks
> Joel

HTH,
Mark.
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to