On 10/04/2012 04:36 PM, Dobbins, Roland wrote:
On Oct 4, 2012, at 9:26 PM, Sander Steffann wrote:
The closer you get to the edge the more common it might become...
iACLs should be implemented at the network edge to drop all IPv4 and IPv6 traffic - including non-initial fragments - directed towards point-to-point links, loopbacks, and other internal infrastructure with exceptions made for cases where there's a legitimate need for sources outside your network to be able to communicate with your infrastructure.
As mentioned previously on the thread, this has nothing to do with transit data-plane traffic, which should be left untouched unless it's specifically classified as attack traffic or other undesirable traffic.
There's an apparently common misperception that fragmented traffic is somehow bad. It isn't. It's normal, under most circumstances. Protect your infrastructure proactively, deal with anything else on a case-by-case basis.
Two students worked on a project in June to measure fragment dropping in IPv6 (and IPv4) using the RIPE Atlas probe infrastructure. Their findings are consistent with Sander's remark. The core seems to do fine, but at the edges it is observed that some middleboxes/CPEs do drop IPv6 fragments. I think this is consistent with the remarks of Joel and Roland earlier on Cisco/Juniper iACL vs. simpler boxes in your network. You can find the report at http://www.nlnetlabs.nl/downloads/publications/pmtu-black-holes-msc-thesis.p.... Best, -- Benno -- Benno J. Overeinder NLnet Labs http://www.nlnetlabs.nl/