Marko,
Please read Chapter 4 of this book or just the RFC-3704:
http://www.amazon.com/Router-Security-Strategies-Securing-Network/dp/158
7053365/ref=sr_1_1?ie=UTF8&s=books&qid=1273551557&sr=8-1
I personally like the traffic plane stuff like this one.
Believe me it's an IE security thing :-) that's why you've never touched
it, but if I come across a sharp student I'll push him to read through
the while RFC-3704; a nice one. The beauty of this could be a appeared
in a question like "choose the best industry standard (RFC-based)
solution to ensure..." or something like that.
PS0. I've never tried this out on a Juniper box; but I'm under
impression that Juniper does support the feasible mode; to get rid of
the whole BGP thing.
PS1. I doubt it, really!; that you can find such sharp security students
PS2. CCIE R&S candidates usually don't go beyond the ACL attached to the
uRPF command.
PS3. RFC's are usually good :)
--------------------------
Kambiz Agahian
CCIE (R&S), CCSI, WAASSE, RSSSE
Technical Instructor
CCBOOTCAMP - Cisco Learning Solutions Partner (CLSP)
Email: kagahian_at_ccbootcamp.com
Toll Free: 877-654-2243
International: +1-702-968-5100
Skype: skype:ccbootcamp?call
FAX: +1-702-446-8012
YES! We take Cisco Learning Credits!
Training And Remote Racks: http://www.ccbootcamp.com
-----Original Message-----
From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of
Marko Milivojevic
Sent: Monday, May 10, 2010 7:59 PM
To: Kambiz Agahian
Cc: Jorge Cortes; Carlos G Mendioroz; Cisco certification
Subject: Re: Understanding Loose uRPF for preventing spoof attacks
I wonder how you "use BGP to use even strict mode" in real live
multihomed network where asymmetric traffic is abundant ;-).
This is btw. a perfectly valid R&S/SP topic, as it is on both
blueprints.
-- Marko Milivojevic - CCIE #18427 Senior Technical Instructor - IPexpert Mailto: markom_at_ipexpert.com Telephone: +1.810.326.1444 Fax: +1.810.454.0130 Community: http://www.ipexpert.com/communities :: Sent from my phone. Apologies for errors and brevity. :: On 11 May 2010, at 04:01, "Kambiz Agahian" <kagahian_at_ccbootcamp.com> wrote: > Jorge, > > Long, long story... > > Very briefly, no the Feasible uRPF has not been implemented within > the IOS yet. In dual or multihomed SP/enterprise networks we usually > use BGP to be able to deploy (even) the Strict mode; BUT to get rid > of that BGP thing you could use the "Feasible feature" :) > > If this imaginary discussion is not still crystal clear and you need > to know more; please give me a buzz. This however sounds more like a > CCIE security to me. > > > -------------------------- > Kambiz Agahian > CCIE (R&S), CCSI, WAASSE, RSSSE > Technical Instructor > CCBOOTCAMP - Cisco Learning Solutions Partner (CLSP) > Email: kagahian_at_ccbootcamp.com > Toll Free: 877-654-2243 > International: +1-702-968-5100 > Skype: skype:ccbootcamp?call > FAX: +1-702-446-8012 > YES! We take Cisco Learning Credits! > Training And Remote Racks: http://www.ccbootcamp.com > > > > > > > -----Original Message----- > From: Jorge Cortes [mailto:jorge.cortes.cano_at_gmail.com] > Sent: Monday, May 10, 2010 5:40 PM > To: Kambiz Agahian > Cc: Carlos G Mendioroz; Cisco certification > Subject: Re: Understanding Loose uRPF for preventing spoof attacks > > Thanks Kambiz, > > Interesting reading. It has raised more questions though: > > Does cisco implement Feasible RPF? Or only Strict and Loose > implementations are supported? > > The following paragraph from section 4.2 confuses me a bit: > > "There are a number of techniques which make it easier to ensure the > ISP's ingress filter is complete. Feasible RPF and Strict RPF with > operational techniques both work quite well for multihomed or > asymmetric scenarios between the ISP and an edge network." > > I would think Strict RPF doesn't work well in multihomed scenarios > where traffic flows asymmetric since most likely you will be receiving > traffic not on the interface used for getting to the network the > traffic is coming from. > > Jorge > > On Mon, May 10, 2010 at 5:53 PM, Kambiz Agahian <kagahian_at_ccbootcamp.com > > wrote: >> Jorge, >> >> Nice question. >> >> According to RFC-3704 there is only three modes of RPF: Strict, Loose >> and Feasible. >> >> When you use the loose mode you're actually ignoring what's called >> "directionality" - why? Because as you've noticed as long as you >> see the >> route the box is happy to forward it. If you take a look at RFC-3704 >> Chapter 2.4; they've exactly answered your question. In that case >> you're >> right; the loose thing is inefficient. >> >> HTH >> >> -------------------------- >> Kambiz Agahian >> CCIE (R&S), CCSI, WAASSE, RSSSE >> Technical Instructor >> CCBOOTCAMP - Cisco Learning Solutions Partner (CLSP) >> Email: kagahian_at_ccbootcamp.com >> Toll Free: 877-654-2243 >> International: +1-702-968-5100 >> Skype: skype:ccbootcamp?call >> FAX: +1-702-446-8012 >> YES! We take Cisco Learning Credits! >> Training And Remote Racks: http://www.ccbootcamp.com >> >> >> >> >> >> >> >> >> -----Original Message----- >> From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On >> Behalf Of >> Carlos G Mendioroz >> Sent: Monday, May 10, 2010 11:33 AM >> To: Jorge Cortes >> Cc: Cisco certification >> Subject: Re: Understanding Loose uRPF for preventing spoof attacks >> >> uRPF has, appart from vrf modes, 4 alternatives: >> loose/strict, with or w/o default. >> >> Strict needs the (default/specific network) pointing to the >> incoming if. >> Loose needs the (default/specific network) pointing somewhere. >> >> Loose with default is kind of useless, IMHO, but loose needs the >> route >> to the origing to be at the RIB, so the source has to be known... >> >> -Carlos >> >> Jorge Cortes @ 10/5/2010 12:42 -0300 dixit: >>> Hi Team, >>> >>> I've been thinking about uRPF for preventing spoof attacks and so >>> far >>> this is what I understand: >>> >>> When strict uRPF is in use, the incoming packets are checked against >>> the routing table and there must be an exact match [network, >>> outgoing >>> interface] in it in order for the packet to be forwarded, >>> otherwise it >>> is dropped. >>> When loose uRPF is in use, the routing table is only checked for >>> routes pointing to the source network of the incoming packets, but a >>> check on the incoming interface is not enforced. >>> >>> So given the above facts strict uRPF is very well suited for >>> preventing spoof attacks when the offending packets have an >>> spoofed IP >>> address in any network that is not in the routing table, as well as >>> internal networks; however, I can see that loose uRPF fails to >>> prevent >>> spoof attacks when the offending packets have an spoofed IP >>> address in >>> the internal network, since the routers have routes for the internal >>> networks and there is no check enforced on the incoming interface, >>> is >>> my understanding correct? >>> >>> If we have a multihomed topology where the traffic flows are >>> asymmetric and we are asked to prevent spoof attacks with IP >>> addresses >>> in the internal network, what would be the way to accomplish this? >>> The >>> simplest solution that comes to my mind would be applying ingress >>> access lists denying packets with source ip address from the >>> internal >>> network on the interfaces facing the external network, but I would >>> like to expand the possibilities. >>> >>> Thanks, >>> Jorge >>> >>> >>> Blogs and organic groups at http://www.ccie.net >>> >>> >>Received on Mon May 10 2010 - 21:34:52 ART
This archive was generated by hypermail 2.2.0 : Tue Jun 01 2010 - 07:09:52 ART