This post is more than 5 years old

1496

February 23rd, 2017 06:00

changing IP TTL

What does it take to change the default IP TTL?

e.g.

node-1# sysctl net.inet.ip.ttl

net.inet.ip.ttl: 64

node-1#

I believe this involves adding the following to /etc/sysctl.conf

net.inet.ip.ttl=10

What we're trying to do is to apply "hop sphere hardening", i.e. to harden against the (rare) situation in which a OneFS cluster is compromised by a malicious party.  If the cluster emits IP frames with a low TTL, then it cannot be used as a DoS platform, nor can data be copied off it to a distant location.

?

--sk

4 Operator

 • 

1.2K Posts

February 23rd, 2017 20:00

Not commenting on that specific plan, but KB 462759 describes how set cluster-wide sysctls in OneFS.


-- Peter


2 Intern

 • 

300 Posts

February 24th, 2017 01:00

tuning the ip ttl to prevent datasteals... wow... and i thought my paranoia level is high

February 24th, 2017 02:00

Ah, KB 462759 is what I wanted, thank you.

You know, I would claim that this isn't entirely paranoia ... I work at a non-profit, and we just aren't particularly concerned about security (nothing to steal).  What concerns us a little more relates to DoS -- someone swamping out Internet links using the cluster as a DoS platform (consider the DNS vulnerability of some years ago, in which OneFS clusters ... and plenty of other platforms ... were hijacked to send streams of DNS frames at targets ... even a small cluster combined with a fat Internet pipe makes a *fabulous* DoS platform )  Or, someone imagining that the data on our cluster would be useful to them, copying it off, and swamping our outbound Internet pipe in the process.  This IP TTL mod limits the radius of damage.

That being said, the global value of shrinking IP TTL would be, I suspect, found in applying this to Internet of Things devices ... rather than to low-volume boxes like OneFS clusters.

Anyway, has anyone else considered doing this?  Or I am actually breaking ground here? 

--sk

2 Intern

 • 

300 Posts

February 24th, 2017 06:00

this scenario only works, if your isilon DNS (or any other DNS) is reachable from the Internet (replay attack). OR (and this is even worse) if the isilon would be hijacked. Even if you are not concerned about security, i would want to prevent the cause and not the symptoms.

But that's none of my business

Rgds

--sluetze

February 24th, 2017 15:00

Yes, I think you're pointing out a relevant point -- twinking with IP TTL would (ideally!) just be a minor step in any set of defense-in-depth efforts.

No Events found!

Top