[dns-operations] Configurable TC=1?

Roland Dobbins rdobbins at arbor.net
Fri Dec 25 01:21:08 UTC 2015


On 24 Dec 2015, at 11:11, Paul Vixie wrote:

> we need to get everything possible done as soon as possible.

I agree with this.  And influencing network infrastructure vendors to 
default to source-address validation wherever practical should be a 
major focus.

> some of the IDC's are saying they can't do BCP 38 at all because it's 
> ingress filtering and that
> would many working customer configs. for them, we need to say, use 
> egress filtering.

If you don't know what ought to be ingressing your network at your 
customer aggregation edges, you don't know what ought to be egressing 
your network at your peering/upstream transit edges.

If you do know what ought to be ingressing your network at your customer 
aggregation edges, then you can do the requisite filtering on the 
coreward interfaces of your peering-/transit-edge boxes, if you must.  
It's ingress filtering from the perspective of those particular boxes, 
egress filtering from the perspective of your network as a whole.

Is some part of the problem terminology?  Since you've done a good job 
of popularizing the more palatable term 'source-address validation', is 
it time to rev the relevant BCPs/RFCs, also to include the proviso that 
network egress filtering has the same practical effect as network 
ingress filtering from the standpoint of what your network emits?

Should we consider using the terms 'network emission control' or 
'Internet emission control', which evokes both electronic warfare and 
environmental pollution imagery?  Would 'Internet pollution' and/or 
'Internet toxicity' be useful concepts to push, to help non-specialists 
understand?

> some of the IDC's are saying they won't bother to do BCP 38 because of 
> the cable and DSL
> edge being such a large attack surface. for them, we need to say, 
> thank you for your fine
> whine, we've got a fix for that in DOCSIS 3.X, and it's time for you 
> to shoulder your share of
> this global problem.

We all know that simply saying isn't working.  Network infrastructure 
vendors should be able to implement source-address validation as a 
default in their broadband wireline access devices without breaking the 
world, should they not?
>
> i am particularly incensed by the transit providers who won't do SAV 
> against their wireline customers "because
> they might be multihomed". i tell them, make SAV your default, and 
> open up the filters when
> and if a specific customer needs it.

I concur, in the context of providing downstream transit to an endpoint 
network.  However, customer-of-my-customer (of my customer, of my 
customer . . .) wholesaling scenarios are a bit more complex.

> the larger problem is what randy bush said upthread-- we're asking the 
> people causing the
> problem to take action which will add to their operational costs

Yes, everybody here knows that.

> for them, i'm pursuing insurance, securities, and liability
> regulatory/legislative solutions. they won't act until their 
> competitors are also forced to act.
> it's like stopping spam, in that sense. so i'm working to force their 
> competitors to act. QED?

I'm an advocate of these approaches, as you know.  However, network 
infrastructure vendors should also be part of the solution-set, when and 
where they can be, from a topological perspective.  In point of fact, 
they've the potential to be more effective than all the above, IMHO.

I'd also like the major OS vendors to incorporate Spoofer Project-like 
functionality into their OSes, with the data and analysis of said data 
made publicly available via a common portal.  I believe it wouldn't be 
too difficult to make the case to them that doing so is in their 
interests, and the interests of their customers.  SAVA - Source Address 
Validation Association, or somesuch.

> http://www.darkreading.com/perimeter/ddos-and-the-internets-liability-problem/a/d-id/1323197

Yes, I read it when you posted it, and agree wholeheartedly.

However, getting action in the legal/liability/regulatory (this last has 
the potential to be iatrogenic, it must be a last resort) spheres 
requires data.

Getting Spoofer Project-like functionality embedded in the major OSes 
and the resultant data would be a way to construct a broad enough data 
horizon to support both technical and non-technical approaches, IMHO.  
Convening a Source-Address Validation Summit or Internet Pollution 
Summit or somesuch with the right participants would be a way to 
kickstart this effort.

-----------------------------------
Roland Dobbins <rdobbins at arbor.net>




More information about the dns-operations mailing list