[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Handling rogue RA feedback
i'll try to summarize what i know of about handling rogue RAs.
- L2 switch solution: filter rogue RAs in the switches, just like
filter rogue DHCPv4. you can detect potential RA sources by
MLD joins to ff02::2 (all-routers link local multicast addr).
CONS: you cannot protect victims within the same wireless
base station, for instance.
- end node host firewall solution: at every node, look at the content
of RAs and reject them if they advertise prefixes like
fec0:0:0:xxxx::/64.
CONS: not widely deployable, can filter false positives
- KAME rafixd: shoot down rogue RAs by announcing against those rogue
RAs with 0 prefix/router lifetime
PROS: easy to deploy, maybe we should ship it with *BSD
CONS: need to take down the source of rogue RA anyways
using DHCPv6 is NOT a soultion, as you can see rogue DHCPv6 server/
relay agent just like rogue RAs.
itojun