Document Action: 'Security Concerns With IP Tunneling' to Informational RFC (draft-ietf-v6ops-tunnel-security-concerns-04.txt)

The IESG <iesg-secretary@ietf.org> Mon, 07 February 2011 21:45 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@core3.amsl.com
Delivered-To: ietf-announce@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1928B3A6F81; Mon, 7 Feb 2011 13:45:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.568
X-Spam-Level:
X-Spam-Status: No, score=-102.568 tagged_above=-999 required=5 tests=[AWL=0.031, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qmxkM4P1TafU; Mon, 7 Feb 2011 13:45:18 -0800 (PST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 042923A6FB0; Mon, 7 Feb 2011 13:45:18 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: Document Action: 'Security Concerns With IP Tunneling' to Informational RFC (draft-ietf-v6ops-tunnel-security-concerns-04.txt)
X-Test-IDTracker: no
X-IETF-IDTracker: 3.12
Message-ID: <20110207214518.31350.8955.idtracker@localhost>
Date: Mon, 07 Feb 2011 13:45:18 -0800
Cc: v6ops mailing list <v6ops@ietf.org>, Internet Architecture Board <iab@iab.org>, v6ops chair <v6ops-chairs@tools.ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Feb 2011 21:45:22 -0000

The IESG has approved the following document:
- 'Security Concerns With IP Tunneling'
  (draft-ietf-v6ops-tunnel-security-concerns-04.txt) as an Informational
RFC

This document is the product of the IPv6 Operations Working Group.

The IESG contact persons are Ron Bonica and Dan Romascanu.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-ietf-v6ops-tunnel-security-concerns/




Technical Summary

   Relevant content can frequently be found in the abstract
   and/or introduction of the document.  If not, this may be 
   an indication that there are deficiencies in the abstract
   or introduction.

Working Group Summary

   Was there anything in the WG process that is worth noting?
   For example, was there controversy about particular points 
   or were there decisions where the consensus was
   particularly rough? 

Document Quality

   Are there existing implementations of the protocol?  Have a 
   significant number of vendors indicated their plan to
   implement the specification?  Are there any reviewers that
   merit special mention as having done a thorough review,
   e.g., one that resulted in important changes or a
   conclusion that the document had no substantive issues?  If
   there was a MIB Doctor, Media Type, or other Expert Review,
   what was its course (briefly)?  In the case of a Media Type
   Review, on what date was the request posted?

Personnel

   Who is the Document Shepherd for this document?  Who is the 
   Responsible Area Director?  If the document requires IANA
   experts(s), insert 'The IANA Expert(s) for the registries
   in this document are <TO BE ADDED BY THE AD>.'

RFC Editor Note


* In the Abstract

OLD:

The primary intent of this document is to raise the awareness level regarding the security issues with IP tunnels as deployed today.

NEW:

The primary intent of this document is to raise the awareness level regarding the security issues with IP tunnels as deployed and propose strategies for the mitigation of those issues.



* After Section 5.1.1.

OLD:
<empty>

NEW:

5.1.2. Discussion

Several tunnel protocols use endpoint addresses that can be algorithmically derived from some known values. These addresses are structured and the fields contained in them can be fairly predictable. 
This reduces the search space for an attacker and reduces the resistance of the address to scanning attacks. e.g. Teredo addresses are formed using a well known prefix, client and server IPv4 addresses, the client port and a few flags. With a fairly narrow search space for most of these fields, it is easy to guess the tunnel endpoint address.

5.1.3. Recommendations

It is recommended that the tunnel protocol developers use tunnel endpoint addresses that are not easily guessable. When the tunnel endpoint addresses are structured and fairly guessable, it is recommended that the implementation use any unused fields in the address to provide additional entropy to the address  in order to reduce the address-scanning risks. e.g. This could be done by setting these unused fields to some random values.




* In Section 6.1.3

OLD:
    The scope of the attack can also be reduced by limiting tunneling use
    in general but especially in preferring native IPv4 to tunneled IPv6;
    this is because it is reasonable to expect that banks and similar web
    sites will continue to be accessible over IPv4 for as long as a
    significant fraction of their customers are still IPv4-only.

NEW:

    The scope of the attack can also be reduced by limiting tunneling use
    in general but especially in preferring native IPv4 to tunneled IPv6
    while connecting to peers who are accessible over IPv4, as doing so
    precludes attacks that are facilitated by changing the tunnel server
    setting.