[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: draft-ietf-opsec-infrastructure-security-01 - InfrastructureHiding



-- "Barry Greene \(bgreene\)" <bgreene@cisco.com> wrote:
 
>> Speaking of BCP38, I do hope you all saw this:
>> 
>>  
>> http://www.ripe.net/ripe/maillists/archives/spoofing-tf/2007/m
>> sg00000.html
>
>Speaking of BCP38++, read through the document. You can see the reasons
>why "source checks" on the ingress of a SP's network need to go beyond
>the IP address. DSCP and MAC are both known checks.

Indeed -- I believe that is mentioned in:

 http://tools.ietf.org/id/draft-baker-sava-simple-00.txt

...although, I think Fred has a different version eslewhere
(I can't find the URL right now). 

In any event, while I think that MAC-level/IP address bindings
are fine tools for source-address validation mechanisms at the
layer 2 'first-hop', I think it might be out scope for SAVA.

But are probably just fine for ietf-opsec stuff. :-)

Also, any marking on a packet, such as DSCP bits, don't have
solid transitive value, IMO -- they can be arbitrarily remarked.

- ferg

--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/