[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Fwd: draft-ietf-opsec-filter-caps-08.txt
Folks,
Please take care of this bit, change the draft to INFORMATIONAL and post
it. As soon as it is posted, I will schedule it for IESG review.
Ron
George Jones wrote:
> Chris, I think that was your text. Care to take a crack that the
> rewording ?
>
> ---George
>
> ---------- Forwarded message ----------
> From: Danny McPherson <danny@tcb.net>
> Date: Jun 27, 2007 10:01 PM
> Subject: draft-ietf-opsec-filter-caps-08.txt
> To: opsec@ops.ietf.org
>
>
> Re-reading this I-D one trivial technical comment from section
> 3.6:
>
> Some denial of service attacks are based on the ability to flood
> the victim with ICMP traffic. One quick way (admittedly with
> some
> negative side effects, e.g. breaking path MTU discovery) to
> mitigate the effects of such attacks is to drop all ICMP traffic
> headed toward the victim.
>
> I'm not sure how dropping ICMP traffic *toward the victim* breaks
> P-MTU, unless it's some ICMP-based Application that's looking to
> discover the path MTU. If you're dropping ICMP traffic back towards
> the source (i.e., the ICMP Destination Unreachable - fragmentation
> needed and DF set) responses I'd understand, but I don't fully
> understand the "e.g." above. Was this an oversight or aim I missing
> something?
>
> Thanks!
>
> -danny
>