Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Owen DeLong
On Jul 17, 2011, at 1:32 PM, William Herrin wrote: > On Sun, Jul 17, 2011 at 1:35 PM, Jeff Wheeler wrote: >> On Sun, Jul 17, 2011 at 11:42 AM, William Herrin wrote: >>> My off-the-cuff naive solution to this problem would be to discard the >>> oldest incomplete solicitation to fit the new one a

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Owen DeLong
On Jul 17, 2011, at 1:17 PM, Jeff Wheeler wrote: > On Sun, Jul 17, 2011 at 3:40 PM, Owen DeLong wrote: >> Basically an ND entry would have the following states and timers: > > I've discussed what you have described with some colleagues in the > past. The idea has merit and I would certainly no

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread William Herrin
On Sun, Jul 17, 2011 at 1:35 PM, Jeff Wheeler wrote: > On Sun, Jul 17, 2011 at 11:42 AM, William Herrin wrote: >> My off-the-cuff naive solution to this problem would be to discard the >> oldest incomplete solicitation to fit the new one and, upon receiving >> an apparently unsolicited response t

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Jeff Wheeler
On Sun, Jul 17, 2011 at 3:40 PM, Owen DeLong wrote: > Basically an ND entry would have the following states and timers: I've discussed what you have described with some colleagues in the past. The idea has merit and I would certainly not complain if vendors included it (as a knob) on their boxes

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Owen DeLong
On Jul 17, 2011, at 10:35 AM, Jeff Wheeler wrote: > On Sun, Jul 17, 2011 at 11:42 AM, William Herrin wrote: >> My off-the-cuff naive solution to this problem would be to discard the >> oldest incomplete solicitation to fit the new one and, upon receiving >> an apparently unsolicited response to

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Jeff Wheeler
On Sun, Jul 17, 2011 at 11:42 AM, William Herrin wrote: > My off-the-cuff naive solution to this problem would be to discard the > oldest incomplete solicitation to fit the new one and, upon receiving > an apparently unsolicited response to a discarded solicitation, > restart the process flagging

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread William Herrin
On Mon, Jul 11, 2011 at 8:17 PM, Karl Auer wrote: > RFC3756 IPv6 Neighbor Discovery (ND) Trust Models and Threats > >   In this attack, the attacking node begins fabricating addresses with >   the subnet prefix and continuously sending packets to them.  The last >   hop router is obligated to reso

Re: NDP DoS attack

2011-07-17 Thread Florian Weimer
* Mikael Abrahamsson: > On Sun, 17 Jul 2011, Florian Weimer wrote: > >> Interesting, thnaks. It's not the vendors I would expect, and it's >> not based on SEND (which is not surprising at all and actually a >> good thing). > > Personally I think SEND is never going to get any traction. Last time

Re: NDP DoS attack

2011-07-17 Thread Mikael Abrahamsson
On Sun, 17 Jul 2011, Florian Weimer wrote: > Interesting, thnaks. It's not the vendors I would expect, and it's not > based on SEND (which is not surprising at all and actually a good > thing). Personally I think SEND is never going to get any traction. > Is this actually secure in the sense

Re: NDP DoS attack

2011-07-17 Thread Florian Weimer
* Mikael Abrahamsson: > On Sun, 17 Jul 2011, Florian Weimer wrote: > >> Others use tunnels, PPPoE or lots of scripting, so certainly >> something can be done about it. To my knowledge, SAVI SEND is still >> at a similar stage. Pointers to vendor documentation would be >> appreciated if this is n

Re: NDP DoS attack

2011-07-17 Thread Mikael Abrahamsson
On Sun, 17 Jul 2011, Florian Weimer wrote: > Others use tunnels, PPPoE or lots of scripting, so certainly something > can be done about it. To my knowledge, SAVI SEND is still at a similar > stage. Pointers to vendor documentation would be appreciated if this is > not the case. -- Mikael

Re: NDP DoS attack

2011-07-17 Thread Florian Weimer
* Mikael Abrahamsson: > On Sun, 17 Jul 2011, Florian Weimer wrote: > >> In practice, the IPv4 vs IPv6 difference is that some vendors >> provide DHCP snooping, private VLANs and unicast flood protection in >> IPv4 land, which seems to provide a scalable way to build Ethernet >> networks with addre

Re: NDP DoS attack

2011-07-17 Thread Mikael Abrahamsson
On Sun, 17 Jul 2011, Florian Weimer wrote: > In practice, the IPv4 vs IPv6 difference is that some vendors provide > DHCP snooping, private VLANs and unicast flood protection in IPv4 land, > which seems to provide a scalable way to build Ethernet networks with > address validation---but there i

Re: NDP DoS attack

2011-07-17 Thread Dobbins, Roland
On Jul 17, 2011, at 4:15 PM, Florian Weimer wrote: > In practice, the IPv4 vs IPv6 difference is that some vendors provide DHCP > snooping, private VLANs and unicast flood protection in IPv4 > land, which seems to provide a scalable way to build Ethernet networks with > address validation---but

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-17 Thread Dobbins, Roland
On Jul 15, 2011, at 10:24 AM, Jimmy Hess wrote: > In most cases if you have a DoS attack coming from the same Layer-2 network > that a router is attached to, > it would mean there was already a serious security incident that occured to > give the attacker that special point to attack fr This s

Re: NDP DoS attack

2011-07-17 Thread Florian Weimer
* Jared Mauch: > Solving a local attack is something I consider different in scope > than the current draft being discussed in 6man, v6ops, ipv6@ etc... That's not going to happen because it's a layering violation between the IETF and IEEE. It has not been solved during thirty years of IPv4 over

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-15 Thread Christopher Morrow
On Thu, Jul 14, 2011 at 9:47 PM, Owen DeLong wrote: > > Very true. This is where Mr. Wheeler's arguments depart from reality. He's > right > in that the problem can't be truly fixed without some very complicated code > added > to lots of devices, but, it can be mitigated relatively easily and m

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-15 Thread Valdis . Kletnieks
On Thu, 14 Jul 2011 23:13:03 PDT, Owen DeLong said: > On Jul 14, 2011, at 8:24 PM, Jimmy Hess wrote: > > In most cases if you have a DoS attack coming from the same Layer-2 > > network that a router is attached to, > > it would mean there was already a serious security incident that > > occured to

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Owen DeLong
On Jul 14, 2011, at 8:24 PM, Jimmy Hess wrote: > On Thu, Jul 14, 2011 at 9:35 PM, Jared Mauch wrote: >> On Jul 14, 2011, at 10:06 PM, Fernando Gont wrote: >> Anyone on a layer-2 network can do something interesting like flood all f's >> and kill the lan. Trying to keep the majority of thoughts

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Fernando Gont
On 07/15/2011 12:24 AM, Jimmy Hess wrote: > A similarly hazardous situation exists with IPv4, and it is basically > unheard of for IPv4's Layer 2/ARP security weaknesses to be exploited > to create a DoS condition, even though they can be (very easily), IMO, the situation is different, in that

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Jimmy Hess
On Thu, Jul 14, 2011 at 9:35 PM, Jared Mauch wrote: > On Jul 14, 2011, at 10:06 PM, Fernando Gont wrote: > Anyone on a layer-2 network can do something interesting like flood all f's > and kill the lan. Trying to keep the majority of thoughts here for layer-3 > originated attacks, even if the t

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Jared Mauch
http://tools.ietf.org/html/draft-gashinsky-v6nd-enhance-00 Sent from my iThing On Jul 14, 2011, at 10:57 PM, Fernando Gont wrote: > On 07/14/2011 11:35 PM, Jared Mauch wrote: > >>> Well, unless there's some layer-2 anti-spoofing mitigation in >>> place, with /64 subnets the "local attacker" ty

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Fernando Gont
On 07/14/2011 11:35 PM, Jared Mauch wrote: >> Well, unless there's some layer-2 anti-spoofing mitigation in >> place, with /64 subnets the "local attacker" typically *will* have >> enough addresses. > > Solving a local attack Well, I was talking about not *introducing* ;-) one. > is something

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Jared Mauch
On Jul 14, 2011, at 10:06 PM, Fernando Gont wrote: >> It should be possible to mitigate this, so long as the attack does not >> actually >> originate from a neighbor on the same subnet as a router IP interface on >> an IPv6 subnet with sufficient number of IPs. > > Well, unless there's some

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Fernando Gont
On 07/14/2011 10:24 PM, Jimmy Hess wrote: >> In this particular case, if the implementation enforces a limit on the >> number of entries in the "INCOMPLETE" state, then only nodes that have >> never communicated with the outside world could be affected by this >> attack. And if those entries that a

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Owen DeLong
On Jul 14, 2011, at 6:24 PM, Jimmy Hess wrote: > On Thu, Jul 14, 2011 at 7:29 PM, Fernando Gont wrote: >> On 07/11/2011 09:17 PM, Karl Auer wrote: >> Vulnerability to this specific issues has a great deal to do with the >> implementation. After all, whenever there's a data structure that can > Y

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Jimmy Hess
On Thu, Jul 14, 2011 at 7:29 PM, Fernando Gont wrote: > On 07/11/2011 09:17 PM, Karl Auer wrote: > Vulnerability to this specific issues has a great deal to do with the > implementation. After all, whenever there's a data structure that can Yes > In this particular case, if the implementation enf

Re: NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-14 Thread Fernando Gont
On 07/11/2011 09:17 PM, Karl Auer wrote: > I realise this is not "specific implementations" as you requested, but > it seems to me that the problem is generic enough not to require that. > > The attack is made possible by the design of the protocol, not any > failing of specific implementations. S

NDP DoS attack (was Re: Anybody can participate in the IETF (Was: Why is IPv6 broken?))

2011-07-11 Thread Karl Auer
On Mon, 2011-07-11 at 18:48 -0500, Jimmy Hess wrote: > It would be useful to at least have the risk properly described, in > terms of what kind of DoS condition could arise on specific implementations. RFC3756 IPv6 Neighbor Discovery (ND) Trust Models and Threats Section 4.3.2 In this attack,