This story appeared on Network World Fusion at
http://www.nwfusion.com/columnists/2000/0221bradner.html

'Net Insider:

Is a new Internet architecture needed?
 

By Scott Bradner
Network World, 02/21/00            


I got a call from a reporter the other day. He wanted to talk about the denial-of-service attacks on prominent Internet sites, including Yahoo, CNN and eBay. He did have some idea what was going on (not always the case when I get such a call), but he seemed to want me to say that the architecture of the Internet needed to be changed to deal with such attacks. I declined to do so.

It is true that the Internet architecture's openness makes the kinds of attacks that we saw a couple of weeks ago easier to launch while, at the same time, making it harder to track down the perpetrators. But it is that same openness that created the economic engine that the Internet has become. We need to be very careful not to overreact to the extent of killing the features that have made the Internet successful.

There were two different types of attacks that were used in the recent incidents - SYN flooding and smurf attacks. I wrote about smurf attacks almost two years ago (NW, April 27, 1998, page 42) and SYN attacks have been known about for quite a while. Attackers using these techniques depend on forging the source addresses of the packets they send in order to hide their tracks.

RFC 2267 describes how network managers can help protect the Internet from people or corrupted computers at their sites by ensuring that packets leaving the sites do not have forged source addresses. This RFC was published two years ago as an Informational RFC and has just been approved for republication as a Best Current Practices (BCP) RFC, a category that the IETF uses to label documents describing the best thinking on how to perform some function.

Filtering, as described in RFC 2267, is not a cure-all because not everyone does it, and it does not stop the attack itself. But it can make tracking easier. There are well-known ways that sites can protect themselves from the effects of SYN attacks and other ways to filter out some of the effects of smurf attacks. But we are now seeing calls for more drastic actions.

At first glance one of the most attractive methods would be to require that all Internet traffic include authentication information so the sites would know to whom they are talking. The technology exists to do this. But this cure would be far worse than the disease because the same authentication would mean a perfect record could be kept of the activities of all Internet users - not a pleasant prospect for anyone who is remotely concerned with individual privacy.

Let's try to figure out how to address the problems raised by the attackers without requiring each of us to undress for governments and big business.

Disclaimer: Harvard tries to track at least the location of its alumni, but that is for fundraising, not privacy violation reasons. So the above plea is mine.
 

All contents copyright 1995-2002 Network World, Inc. http://www.nwfusion.com