BCP for securing IPv6 Linux end node in AWS

Alarig Le Lay alarig at swordarmor.fr
Sun May 14 13:42:26 UTC 2017

On dim. 14 mai 09:29:45 2017, Eric Germann wrote:
> Good morning all,
> I’m looking for some guidance on best practices to secure IPv6 on
> Linux end nodes parked in AWS.
> Boxes will be running various services (DNS for starters) and I’m
> looking to secure mainly ICMP at this point.  Service filtering is
> fairly cut and dried.  
> I’ve reviewed some of the stuff out there, but apparently I’m catching
> too many of the ICMP types in the rejection as routing eventually
> breaks.  My guess is router discovery gets broken by too tight of
> filters.
> Thanks for any guidance.


Filtering ICMP breaks Internet and it is even more true with IPv6 as
almost all the bootstrap is based on ICMP (ND, RD, RA, etc.). Plus, you
will break connections where there is a MTU change on the path.

So, my advise is simply to not filter ICMP and ICMPv6. And by the way,
why do want to filter ICMP? You will not be DDoSed with pings.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20170514/fb13cdf8/attachment.pgp>

More information about the NANOG mailing list