JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for IPV6-USERS Archives


IPV6-USERS Archives

IPV6-USERS Archives


IPV6-USERS@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

IPV6-USERS Home

IPV6-USERS Home

IPV6-USERS  July 2008

IPV6-USERS July 2008

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: Microsofts ICS causes IPv6 problems...

From:

Tom Griffin <[log in to unmask]>

Reply-To:

Tom Griffin <[log in to unmask]>

Date:

Fri, 18 Jul 2008 21:12:10 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (82 lines)

Hello Jim,

We were one of the many reporting horror stories some time ago and it did indeed
cripple our DNS service.

Luckily there was a Windows patch which fixed the bug causing Windows hosts to
get caught in a 'loop' and flood the DNS queries at an alarming rate. We also
vastly improved our DNS architecture to handle the potential higher load caused
by the problem.

These issues aside, we are left with the same scenario with v4 and rogue DHCP
which is also enabled with ICS on Windows. We handle v4 DHCP with DHCP snooping
on the Cisco switches and netflow export filters to alert us of any hosts
offering DHCP leases.

For IPv6 we are yet to widely deploy a solution, but I have heard good things
about rafixd (http://www.kame.net/dev/cvsweb2.cgi/kame/kame/kame/rafixd/). When
placed in a network segment, rafixd will listen for rogue RAs and essentially
'poison' the network segment by advertising the same prefix with a zero
lifetime, causing it to expire on each host. Of course this doesn't remove the
offending host which means there is also some more work to be done.

We had also considered the option of higher preference RAs being sent from our
routers, but that suggests to our users we are offering v6 connectivity to the
whole of campus which we are not yet ready to do.

The idea of using ACLs is something I feel wouldn't fix the problem, as it
doesn't stop users on the same LAN segment from being affected by another
user's mis-configured machine (since we cannot apply layer 3/4 ACLs to a layer
2 port).

Tom Griffin
Data Network Administrator
University of Sheffield

Quoting Jim Jackson <[log in to unmask]>:

> Hi,
> 
> We'd heard a few IPv6 related horror stories[1] incriminating ICS on IPv6 
> aware Windows XP and Vista, so we've done some testing.
> 
> The main problem is that of Rogue Router Advertisements (RAs)
> 
>    http://tools.ietf.org/html/draft-chown-v6ops-rogue-ra-01
> 
> When ICS is enabled (we used a laptop with a wireless and wired interface, 
> setting the wireless as the "internet" connection to share), ICS starts to 
> advertise itself as a default IPv6 router on the wired network, using a 
> 6to4 address and prefix. On our network all the IPv6 hosts stopped using 
> the official default route via our Cisco router, and started routing via 
> the ICS box. Also all IPv6 hosts picked up a new 6to4 IPv6 address.
> 
> Our Cisco 6500 switch also picked up a 6to4 address on that VLAN interface, 
> and let the ICS default route take precedence, sending ICMPv6 redirects to 
> the ICS box when ever it received a packet to route. It continued doing 
> this after the ICS box was turned off and removed from the network, 
> necessitating manual intervention to restore normal service.
> 
> Our thinking to protect against such software being "accidently" deployed 
> are
> 
>   - to set the official Router Advertisements as high preference (RFC4191),
>     when we have a version of Cisco IOS that supports this. The ICS RAs
>     appear to have medium preference. Hopefully ipv6 hosts will
>     continue to use the official default route.
> 
>   - setup an ACL on the cisco box to drop incoming RAs from the network,
>     hopefully stopping the cisco routing being polluted.
> 
> Has anyone any comments or can anyone share any defensive measures they 
> have taken to cope with rogue RAs etc.
> 
> cheers
> Jim
> Network Development Team
> University of Leeds
> 
> [1] one such story involved ICS making huge levels of DNS requests, 
> effectively DoS'ing the DNS server. We haven't observed this.
> 

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

April 2024
February 2024
December 2023
October 2023
September 2023
June 2023
May 2023
March 2023
January 2023
December 2022
November 2022
June 2022
May 2022
December 2021
April 2021
March 2021
February 2021
December 2020
October 2020
October 2019
August 2019
March 2019
November 2018
August 2018
July 2018
March 2018
February 2018
November 2017
August 2017
June 2017
May 2017
April 2017
January 2017
November 2016
October 2016
September 2016
June 2016
May 2016
January 2016
December 2015
November 2015
October 2015
September 2015
July 2015
October 2014
November 2013
October 2013
August 2013
June 2013
March 2013
February 2013
September 2012
August 2012
July 2012
June 2012
April 2012
February 2012
December 2011
November 2011
October 2011
September 2011
August 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
February 2010
January 2010
December 2009
November 2009
February 2009
December 2008
November 2008
July 2008
June 2008
May 2008
January 2008
December 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
March 2007
2006
2005
2004
2003
2002
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager