Message ID | 20140319172210.GA29745@midget.suse.cz |
---|---|
State | Deferred, archived |
Delegated to: | David Miller |
Headers | show |
On Wed, Mar 19, 2014 at 06:22:10PM +0100, Jiri Bohac wrote: > I have been looking for the reason behind the default of > accept_ra_rt_info_max_plen being 0. No luck. > > The feature has been introduced by 09c884d4 ([IPV6]: ROUTE: Add > accept_ra_rt_info_max_plen sysctl). > > The only relevant discussion I found was > http://markmail.org/message/5m34bfzhox6y5lcf > with no explanation. > > I imagine that the motivation for setting > accept_ra_rt_info_max_plen to 0 would be security concerns. > > However, RFC 4191, section "6. Security Consideration", concludes > that the new features don't increase the risks already present: > > A malicious node could send Router Advertisement messages, specifying > a High Default Router Preference or carrying specific routes, with > the effect of pulling traffic away from legitimate routers. However, > a malicious node could easily achieve this same effect in other ways. > > For example, it could fabricate Router Advertisement messages with a > zero Router Lifetime from the other routers, causing hosts to stop > using the other routes. By advertising a specific prefix, this > attack could be carried out in a less noticeable way. However, this > attack has no significant incremental impact on Internet > infrastructure security. > > Sounds reasonable to me. > > Also, RFC 6434 has been published since, and under 5.3. it says: > > Small Office/Home Office (SOHO) deployments supported by routers > adhering to [RFC6204] use RFC 4191 to advertise routes to certain > local destinations. Consequently, nodes that will be deployed in > SOHO environments SHOULD implement RFC 4191. > My concern with the kernel adding arbitrary length prefix routes to the routing table is, that this could enable attacks on VPN software by advertising smaller prefixes thus still leaving basic connectivity intact but rerouting VPN internal traffic around the VPN tunnel because of the more specific lookup. Sure, this also is a problem for DHCP/IPv4 setups, but that is a concern of userspace. ;) I am totally fine with your reasoning and don't know what the initial motivation for the default setting was, but I am a bit hesitant about this change. Greetings, Hannes -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
diff --git a/Documentation/networking/ip-sysctl.txt b/Documentation/networking/ip-sysctl.txt index ab42c95..5a5f7d3 100644 --- a/Documentation/networking/ip-sysctl.txt +++ b/Documentation/networking/ip-sysctl.txt @@ -1219,10 +1219,9 @@ accept_ra_pinfo - BOOLEAN accept_ra_rt_info_max_plen - INTEGER Maximum prefix length of Route Information in RA. - Route Information w/ prefix larger than or equal to this - variable shall be ignored. + Route Information w/ prefix larger than this variable shall be ignored. - Functional default: 0 if accept_ra_rtr_pref is enabled. + Functional default: 128 if accept_ra_rtr_pref is enabled. -1 if accept_ra_rtr_pref is disabled. accept_ra_rtr_pref - BOOLEAN diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c index fdbfeca..6d8d028 100644 --- a/net/ipv6/addrconf.c +++ b/net/ipv6/addrconf.c @@ -225,7 +225,7 @@ static struct ipv6_devconf ipv6_devconf_dflt __read_mostly = { .accept_ra_rtr_pref = 1, .rtr_probe_interval = 60 * HZ, #ifdef CONFIG_IPV6_ROUTE_INFO - .accept_ra_rt_info_max_plen = 0, + .accept_ra_rt_info_max_plen = 128, #endif #endif .proxy_ndp = 0,