nanog mailing list archives

Re: Cable Modem [really responsible engineering]


From: Fletcher E Kittredge <fkittred () gwi net>
Date: Tue, 26 Jun 2001 11:22:15 -0400



This discussion has moved to NANOG ( nanog () merit edu ).  Please
remember to trim your headers not to cross post to dhcp-server.

In fact, given the quality of your comments, why don't you just
respond to me privately and not waste people's time?

I think we are in violent agreement.  I don't like the
IP->MAC->Customer mapping, it is forgeable, but it is the only one I
know we have available.  I agree with you that it is not the only
possible mapping.  If you can point me to a better existing mechanism,
I would be greatful.

Saying something is "forgeable" is assuming that it was supposed to be
authentic in the first place.  MAC addresses and IP addresses weren't
designed for that.

I never said they were.  However, given the design parameters, they
provide useful information which should not be discarded.

If a database was kept of client MACs, and this information was
required before access to service was made available, you then have a
network of known devices and have made a long step towards towards
assigning responsibility.

And every user would have to know the mac address of every piece of
equipment and divulge this to the ISP before they could have service?  And
when they wanted to add a new computer, hook up a friend's laptop?  Buy a
new NIC card?  Come on.  If my ISP did that to me, they'd be gone faster
than lemonaid on a hot day.

Exactly.  You need to supply the MAC address to bring a computer on
line.  Why is the more onerous that supplying a username/password?

Other ISPs restrict the number of systems you can connect, the uses of
those systems (no servers, etc.), block certain ports, etc.  That
displeases me as it reduces the value of the network and breaks
end-to-end.

are not tied to hardware type or specific device:  IP address is much more
useful for that, in my opinion, especially if additional information about
physical connections (such as port and switch numbers) is available.

I tend to agree because:
The mac addresses of the computers in my house may change quite a bit, but
my external IP addresses will remain the same (and have to, since only
those IPs are being routed to me).

Do you have any actual experience with designing or operating such a
public access network?  If so, please explain how to get the "port and
switch number" for a user's PC on a cable network as I was unaware of
this functionality.

Please remember we are talking about large IP over Ethernet *public*
networks (cable, Etherloop DSL, wireless) which are used by a
completely heterogeneous population.  The operator must support the
connection of arbitrary devices.  Many of the customers have very
little knowledge of their configuration or networking.  The network
operator must support arbitrary devices and clueless customers.

And such clueless users may have no idea what their MAC address is.  They
also might have equipment that doesn't list it's MAC address readily.

...and the moon might be made of green cheese.

We haven't had a problem explaining  to users how to get their MAC
addresses.

3) ARIN has sent the strong message that they expect IP over E public
   network providers to use dynamic IP allocation in order to conserve
   IPv4 addresses.

And the intelligent public has sent an equally strong message that dynamic
IPs are not acceptible.  Most people I know with DSL or similar service
make sure to use static IPs that are usable for server purposes.  Wether
static or dynamic IPs are used, the same _number_ of IPs is required, we
aren't talking about dial-up here where most of the users will be offline
most of the time.

I disagree with all of the above.  Since it nothing more than your
opinion and anecdotal evidence, mere contradiction suffices.

   accurately tracked, or that customers be accurately charged for  
   their bandwidth usage.  In gathering these statistics, a MAC

I am a bit confused here.  Most providers don't charge for bandwidth
usage, they charge for bandwidth availability.  My ISP doesn't need to
track the traffic from my MAC address to charge me $Xx.XX for xx mbps.

One needs this information in aggregate in order to model to
accurately set prices.  Otherwise, your company will go out of
business when you charge less for the service than the service cost
to provision, or you charge too much to compete with more accurate
models.

Say, what happened to all those DSL providers that were here just a
minute ago?

[ we have been in business for over seven years, and are profitable...]

Finally, I would not want to declare under oath that a MAC address
absolutely and uniquely identified a client host:  it's just too easy to
spoof.

Again, why even say "spoof", that makes it sound like it's _supposed_ to
be "authentic" or something.  I don't thin I am "spoofing" by changing my
MAC address.  It wasn't supposed to identify me, and nobody ever said it
was.  In fact I have changed the MAC addresses of all of my sparcstations
(which are easily programmable in software!) to be sequential.

That was pretty stupid, wasn't it?  Ethernet MACs must be unique to be
to work.  Have you ever thought about what would happen if more than
one person on the same network as you chose the same Ethernet MACs?

Further, if you reprogram your MACs, and then you would not get
access until you registered them.  So your traffic still could be
tracked.

Total and absolute agreement.  There is no question that it is easy
for a technical sophisticated customer to spoof a MAC address.  This
fact should always be kept in mind when analysing any information.
Your forgot:
3.) An existing MAC address that isn't currently in use is "spoofed".  One
only has to watch the network for a while and get a list of MACs visible
on their net.  (this is especially easy typical on cablemodem
networks).  Wait until one disappears for a while (computer turned
off?).  Assume that MAC address.  You could even discover a pattern that a
certain MAC address is only used from X:XX to X:XX on typical days.  (some
users only turn on their PCs during certain times).

yawn.  I didn't forget; you can't read.  See the first part of my
statement.  Here it is again:

"Total and absolute agreement.  There is no question that it is easy
 for a technical sophisticated customer to spoof a MAC address.  This
 fact should always be kept in mind when analysing any information."


-- noah silva

Noah, go away and don't come back until you have some real experience
and something interesting to say.  At least correspond with me
privately.

. o O (Now, where did I put that kill file?)


Current thread: