[ipv6hackers] (IETF I-D); Implications of IPv6 Addressing on Security Operations (Fwd: New Version Notification for draft-gont-opsec-ipv6-addressing-00.txt)

Fernando Gont fernando at gont.com.ar
Sun Feb 5 16:54:52 -03 2023


Hello, Maarkus,

THanks for the comments! In-line...

On 5/2/23 13:26, Markus Reschke wrote:
> Hi!
> 
> On Sun, 5 Feb 2023, Andrew Walding wrote:
> 
>> Example #5:  Dealing with an intrusive or misbehaving ipv6 source.  The
>> tendency here is to create either a whitelist or blacklist collection of
>> allowed or banned addresses.  In an IPv4 network this is relatively
>> straight forward as an interface most likely has only one address.
>> Further, it does not matter whether the source is a server or client, in
>> the IPv4 space these addresses tend not to change.  In IPv6 this could 
>> also
>> be the case, however there are further considerations.
> 
> IMHO, it's not just about a host having multiple IPv6 addresses or 
> changing addresses (e.g. Privacy Extensions), but also the tradeoff 
> between the number of ACL rules and filtering resources available. The 
> latter also applies to IPv4. Up to some threshold we can put single 
> addresses into the ACL with minimal impact on performance. However, when 
> exceeding the threshold we have to aggregate addresses if possible to 
> counter the performance impact, also creating collateral damage to some 
> extend (another tradeoff). And by adding IPv6 /128s we would run much 
> faster into the threshold.

This is noted in the I-D, though. Is there anything missing?

Thanks!

Regards,
-- 
Fernando Gont
e-mail: fernando at gont.com.ar
PGP Fingerprint: 7F7F 686D 8AC9 3319 EEAD C1C8 D1D5 4B94 E301 6F01


More information about the Ipv6hackers mailing list