Re: [sunset4] Last Call: <draft-ietf-behave-lsn-requirements-07.txt> (Common requirements for Carrier Grade NATs (CGNs)) to Best Current Practice

Sam Hartman <hartmans-ietf@mit.edu> Wed, 11 July 2012 16:46 UTC

Return-Path: <hartmans@mit.edu>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 499F421F85F0; Wed, 11 Jul 2012 09:46:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.259
X-Spam-Level:
X-Spam-Status: No, score=-103.259 tagged_above=-999 required=5 tests=[AWL=-0.994, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zbjGmE3-IRhU; Wed, 11 Jul 2012 09:46:55 -0700 (PDT)
Received: from permutation-city.suchdamage.org (permutation-city.suchdamage.org [69.25.196.28]) by ietfa.amsl.com (Postfix) with ESMTP id D064321F85EF; Wed, 11 Jul 2012 09:46:55 -0700 (PDT)
Received: from carter-zimmerman.suchdamage.org (carter-zimmerman.suchdamage.org [69.25.196.178]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "laptop", Issuer "laptop" (not verified)) by mail.suchdamage.org (Postfix) with ESMTPS id 13BA5203BA; Wed, 11 Jul 2012 12:47:54 -0400 (EDT)
Received: by carter-zimmerman.suchdamage.org (Postfix, from userid 8042) id 5BCEA41F0; Wed, 11 Jul 2012 12:47:16 -0400 (EDT)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: Simon Perreault <simon.perreault@viagenie.ca>
Subject: Re: [sunset4] Last Call: <draft-ietf-behave-lsn-requirements-07.txt> (Common requirements for Carrier Grade NATs (CGNs)) to Best Current Practice
References: <DCC302FAA9FE5F4BBA4DCAD4656937791745903045@PRVPEXVS03.corp.twcable.com> <4FF8A836.2090407@viagenie.ca> <DCC302FAA9FE5F4BBA4DCAD4656937791745A1F0D4@PRVPEXVS03.corp.twcable.com> <4FFAF400.1030201@viagenie.ca> <1DF204BC-FAD6-4A0E-90B0-64760CC1ECF9@huawei.com> <4FFD8727.4020207@viagenie.ca>
Date: Wed, 11 Jul 2012 12:47:16 -0400
In-Reply-To: <4FFD8727.4020207@viagenie.ca> (Simon Perreault's message of "Wed, 11 Jul 2012 10:01:11 -0400")
Message-ID: <tsld3425jor.fsf@mit.edu>
User-Agent: Gnus/5.110009 (No Gnus v0.9) Emacs/22.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Cc: "behave@ietf.org" <behave@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "sunset4@ietf.org" <sunset4@ietf.org>, Tina TSOU <Tina.Tsou.Zouting@huawei.com>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Jul 2012 16:46:56 -0000

Hi. I'd like to speak in favor of maintaining endpoint independent
filtering as the default and maintaining requirement 11 D.  I think
requirement 11 D is important for avoiding some hard to analyze but
potentially very dangerous security problems. If I can trick a NAT into
replacing an existing mapping by causing resource exhaustion then I
could probably attack that.  Unfortunately such attacks tend to appear
minor or hard to exploit until someone puts together what turns out to
be a fairly reliable exploit against some equipment, then you have a
real mess.

I believe the stability of application argument argues for endpoint
independent filtering.