PLAY PODCASTS
A short story of a broken strict uRPF implementation (denog11)

A short story of a broken strict uRPF implementation (denog11)

Chaos Computer Club - archive feed · Benedikt Neuffer

November 12, 20199m 32s

Audio is streamed directly from the publisher (cdn.media.ccc.de) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

At KIT we bought multilayer switches which use NDP and ARP cache information for strict uRPF. This talk shows you how this implementation breaks things. I will start with a short summary how strict uRPF according to RFC3704 works and how it can be used to prevent customers from spoofing source addresses. Afterwards I'll show a implementation of strict uRPF, which only forwards packets of hosts if the IP address is already learned by NDP or ARP. I will show, how this implementation prevents at least current macOS and GNU/Linux systems from connecting to IPv6 addresses outside of the broadcast domain because they do not send unsolicited neighbor solicitations. Furthermore i'll show how this implementation also breaks load balancing setups based on MAC Address Translation and Direct Server Return. about this event: https://pretalx.denog.de/denog11/talk/NGJYFT/

Topics

denog11392019