Re: [BEHAVE] Very late query on stateful NAT64

"Dan Wing" <dwing@cisco.com> Fri, 22 October 2010 15:54 UTC

Return-Path: <dwing@cisco.com>
X-Original-To: behave@core3.amsl.com
Delivered-To: behave@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1EA8A3A68A8 for <behave@core3.amsl.com>; Fri, 22 Oct 2010 08:54:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.134
X-Spam-Level:
X-Spam-Status: No, score=-110.134 tagged_above=-999 required=5 tests=[AWL=0.465, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gI+3Lqznmoqf for <behave@core3.amsl.com>; Fri, 22 Oct 2010 08:54:18 -0700 (PDT)
Received: from rtp-iport-1.cisco.com (rtp-iport-1.cisco.com [64.102.122.148]) by core3.amsl.com (Postfix) with ESMTP id E4B693A6840 for <behave@ietf.org>; Fri, 22 Oct 2010 08:54:17 -0700 (PDT)
Authentication-Results: rtp-iport-1.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EAAtRwUxAZnwN/2dsb2JhbACVFIxPcaUSnB2FSgSEVg
X-IronPort-AV: E=Sophos;i="4.58,224,1286150400"; d="scan'208";a="173668203"
Received: from rtp-core-2.cisco.com ([64.102.124.13]) by rtp-iport-1.cisco.com with ESMTP; 22 Oct 2010 15:55:55 +0000
Received: from dwingWS (rtp-vpn3-1403.cisco.com [10.82.221.129]) by rtp-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id o9MFtqmw009336; Fri, 22 Oct 2010 15:55:55 GMT
From: Dan Wing <dwing@cisco.com>
To: 'Brian E Carpenter' <brian.e.carpenter@gmail.com>, behave@ietf.org
References: <4CC0C319.1040400@gmail.com>
In-Reply-To: <4CC0C319.1040400@gmail.com>
Date: Fri, 22 Oct 2010 08:55:52 -0700
Message-ID: <43f701cb7201$9c9a9020$d5cfb060$@com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: Actxcge5/kg46lsORD2LYqpzOb4dIwAi8LeA
Content-Language: en-us
Cc: 'Se-young Yu' <syu051@aucklanduni.ac.nz>, draft-ietf-behave-v6v4-xlate-stateful@tools.ietf.org
Subject: Re: [BEHAVE] Very late query on stateful NAT64
X-BeenThere: behave@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: mailing list of BEHAVE IETF WG <behave.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/behave>, <mailto:behave-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/behave>
List-Post: <mailto:behave@ietf.org>
List-Help: <mailto:behave-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/behave>, <mailto:behave-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Oct 2010 15:54:19 -0000

> -----Original Message-----
> From: behave-bounces@ietf.org [mailto:behave-bounces@ietf.org] On
> Behalf Of Brian E Carpenter
> Sent: Thursday, October 21, 2010 3:48 PM
> To: behave@ietf.org
> Cc: Se-young Yu
> Subject: [BEHAVE] Very late query on stateful NAT64
> 
> Hi,
> 
> The security considerations of the RFC-to-be draft-ietf-behave-v6v4-
> xlate-stateful-12
> include this:
> 
> >    Another consideration related to NAT64 resource depletion refers
> to
> >    the preservation of binding state.  Attackers may try to keep a
> >    binding state alive forever by sending periodic packets that
> refresh
> >    the state.  In order to allow the NAT64 to defend against such
> >    attacks, the NAT64 MAY choose not to extend the session entry
> >    lifetime for a specific entry upon the reception of packets for
> that
> >    entry through the external interface.
> 
> How does the NAT64 distinguish between malicious keep-alives
> and genuine packets of a one-way UDP flow of some kind? We don't
> see how this can be implemented.

This text is related to existing NAPT44 behavior, where a mapping
is kept active so long as there is an inside->outside flow (which
makes sense, and is usually 15-30 seconds) and is kept active longer 
if there is an outside->inside response (which makes sense, too,
and is usually ~3 minutes).  The next characteristic is that the 
NAT shouldn't keep a mapping alive if there is solely and only
an outside->inside flow.  This is discussed (but with a focus on
RTP flows) in draft-ietf-avt-app-rtp-keepalive, and the best
reference is probably REQ-6 of RFC4787.

Would it be helpful to add a citation to "Section 4.3 of [RFC4787]" 
during that document's AUTH48?

(The wording should be tweaked, anyway, from "MAY choose not to
extend" to "MAY choose to not extend".)

-d