[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Operational comments on RAs vs DHC



On Mon, Mar 19, 2007 at 07:22:23PM +0200, Rémi Denis-Courmont wrote:
> On Monday 19 March 2007 17:42:35 Tim Chown wrote:
> 
> > - Vendors adding RA snooping to L2 devices (doesn't help shared media
> > though)
> 
> Not sure what you mean... switches that trash RAs? how do they know which 
> ports leads to the legitimate router(s) - often different from the switch 
> itself?

Just like DHCP snooping today, you preconfigure it.
 
> > There really isn't a readily deployable countermeasure today, and I think
> > that's causing mild unrest with admins.   Of course, one can just wave the
> > issue away saying it's no different to rogue DHCP servers, though at least
> > there is DHCP snooping on some L2 equipment.
> 
> Some people listen for RAs on the link, and send spoof RA with a zero 
> lifetime, to pretend the offensive advertiser goes down. Of course, this 
> assumes that the advertiser only does multicast RAs, *or* L2 switch infra 
> does not support IPv6 multicast. Also this could break local ACLs.
> 
> Oh, and yes, that's ugly.

That's why I dscounted that option from the outset :)  I think Itojun wrote
the first such 'zapper', but it's a very ugly 'solution'.

> > The related issue is whether certain timers that have been standardised
> > are appropriate in the face of deployment experience.   Recovery from
> > an administratively configured 'errant' RA is another consideration.
> > The above measures may be of no benefit if the 'trusted' party messes up.
> > However one could also say a similar issue exists today for a host getting
> > a bad DHCP lease for a period should a DHC server be misconfigured.
> 
> Yes. It's easier to fix DHCPv4 problems because:
> - the victims users will usually get no connectivity at all, so they reboot or 
> whatever until this gets fixed,
> - the exposure time window is very limited.

The thing to consider (as well) is recovery from misconfiguration.  

-- 
Tim