[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: proxy AH (was: An architectural draft)



On donderdag, mei 29, 2003, at 00:59 Europe/Amsterdam, Eliot Lear wrote:

When you say proxy AH do you mean the ISP actually creating the AH or just discarding invalid/bad AHs?
The idea is that the customer gives to its correspondents a key to be used in calculating the authentication header. This key is derived from one of a small set of possible "master keys" combined with the correspondents source address. The master keys are communicated to the ISP (for instance by inserting them in a BGP attribute) so the ISP can calculate the key used for a packet and then check the authentication header. Then packets that don't have an AH or for which the AH check fails are severely rate limited while packets that pass the check can flow freely. When a key is abused the master keys are rotated and the abuser simply doesn't get a new key.

This requires some serious hardware at the ISP side but it should get rid of DoS real good. The main problem is allowing control traffic in order to distribute the keys to the correspondents. Depending on whether we can/want to use unmodified IKE or not this should either be backward compatible or easy to fix, but probably not both.