[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: RFC 2893 Question - Ingress Filtering of IPv6-in-IPv4
Fred Templin wrote:
>If the decapsulator (and filtering node) B sends the DU as an IPv6/IPv4
encapsulated packet to A
>who was the encapsulator of the original packet, it should be OK
*provided* the IPv6 dst of the DU
>(which is the same as the IPv6 src of the original packet) is one of
A's IPv6 addresses.
>Otherwise, A might forward the DU onward to some unsuspecting node C,
i.e., if the IPv6 src of the
>original packet was spoofed.
>I think it might be nice for A to learn that B is dropping the packets
due to ingress filtering,
>but I don't see a way to send a DU that is guaranteed to stop at A and
not be forwarded onward to
>some unsuspecting node C. Do you?
You have a point here.
No, I don't see a way to protect "unsuspecting node C".
(If node A were a router encapsulating IPv6 traffic, you would actually
want it
to forward the decapsulated DU back to the originating host [for
legitimate traffic] ).
Perhaps the draft should direct that ingress filtered packets be
silently dropped ?