[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Fwd: draft-ietf-opsec-filter-caps-08.txt



Folks,

Please take care of this bit, change the draft to INFORMATIONAL and post
it. As soon as it is posted, I will schedule it for IESG review.

                                      Ron


George Jones wrote:
> Chris, I think that was your text.    Care to take a crack that the
> rewording ?
> 
> ---George
> 
> ---------- Forwarded message ----------
> From: Danny McPherson <danny@tcb.net>
> Date: Jun 27, 2007 10:01 PM
> Subject: draft-ietf-opsec-filter-caps-08.txt
> To: opsec@ops.ietf.org
> 
> 
> Re-reading this I-D one trivial technical comment from section
> 3.6:
> 
>       Some denial of service attacks are based on the ability to flood
>       the victim with ICMP traffic.  One quick way (admittedly with
> some
>       negative side effects, e.g. breaking path MTU discovery) to
>       mitigate the effects of such attacks is to drop all ICMP traffic
>       headed toward the victim.
> 
> I'm not sure how dropping ICMP traffic *toward the victim* breaks
> P-MTU, unless it's some ICMP-based Application that's looking to
> discover the path MTU.  If you're dropping ICMP traffic back towards
> the source (i.e., the ICMP Destination Unreachable - fragmentation
> needed and DF set) responses I'd understand, but I don't fully
> understand the "e.g." above.  Was this an oversight or aim I missing
> something?
> 
> Thanks!
> 
> -danny
>