[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: security policy discovery



On Thu, 12 Sep 2002, Satyadeva Konduru wrote:
> In this scenario, is there not a problem of spoofed packets
> unnecessarily setting up tunnels between Bob and Alice. Each think that
> the other side needs a tunnel to send traffic. This could become a
> denial of service attack, especially if the lifetimes are small, since
> both Bob and Alice will keep setting up tunnels and thus make the setup
> of genuine tunnels slow.

Bob and Alice would be well advised to adaptively adjust the lifetime of
the tunnels they set up, so that if they are starting to burn significant
numbers of cycles setting up and tearing down tunnels to the same place,
they lengthen the tunnel life to reduce the overhead.  (Keeping a tunnel
open costs essentially nothing, at least not until rekeying time.)

                                                          Henry Spencer
                                                       henry@spsystems.net