Re: Last Call: <draft-ietf-opsec-ipv6-implications-on-ipv4-nets-03.txt> (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

SM <sm@resistor.net> Mon, 01 April 2013 21:24 UTC

Return-Path: <sm@resistor.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A858011E80F4 for <ietf@ietfa.amsl.com>; Mon, 1 Apr 2013 14:24:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jsEFtl06XiRn for <ietf@ietfa.amsl.com>; Mon, 1 Apr 2013 14:24:49 -0700 (PDT)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id A2FAD11E80E2 for <ietf@ietf.org>; Mon, 1 Apr 2013 14:24:49 -0700 (PDT)
Received: from SUBMAN.resistor.net (IDENT:sm@localhost [127.0.0.1]) (authenticated bits=0) by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id r31LOgiM002668; Mon, 1 Apr 2013 14:24:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1364851487; bh=7UkiGtGbVG9eJN+jffo4E0vLEwm7Z7moOUKNNsBMZzw=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=46zasMWA0EXiLhqdJ8OR++povsJwRvLuiSqi9Vo32LhLi3ntVLl8Kpl2YGv3MPXri Tmgf3Bjx5c+KvhLnnpasfK8/0w1rUyyON01JmSZjjPsjJWJQ5BgDjadjEdIWZ7T6q6 rqNj+MqdVbN+kgKhCOy36OaSuToWz8FV3+bNyHMQ=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=resistor.net; s=mail; t=1364851487; i=@resistor.net; bh=7UkiGtGbVG9eJN+jffo4E0vLEwm7Z7moOUKNNsBMZzw=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=iRYM/eZmd4nU7MkTparn7uvvNEiTKVcwppwwXW02vKmZVO3BOtP604Aa48psKospX jf80vxH/PUMDTWFCeiocPL/gH+QUZBO0SbTe7KMvIVa37c4y8YufV2kGcQbJUl5vbO u1MrALxfE0WOfanKwEc09n0VVkxDUzhUOcRBKpAU=
Message-Id: <6.2.5.6.2.20130401124437.0a5a1190@resistor.net>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Mon, 01 Apr 2013 13:49:15 -0700
To: Fernando Gont <fgont@si6networks.com>
From: SM <sm@resistor.net>
Subject: Re: Last Call: <draft-ietf-opsec-ipv6-implications-on-ipv4-nets-03.txt> (Security Implications of IPv6 on IPv4 Networks) to Informational RFC
In-Reply-To: <51598243.2020109@si6networks.com>
References: <20130329130326.13012.1402.idtracker@ietfa.amsl.com> <6.2.5.6.2.20130330230305.0bce91a8@resistor.net> <51598243.2020109@si6networks.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Apr 2013 21:24:50 -0000

Hi Fernando,
At 05:49 01-04-2013, Fernando Gont wrote:
>Please re-read the above paragraph -- you missed the part that says
>"...the same security policies".

I saw that. :-)  I commented on Section 6 first as it's only when I 
reached that part of the document that I saw the trade-off between 
blocking IPv6 traffic and security.

>Those issues are not present when your network employs v4-only.

What's missing is some text in the Introduction section explaining 
that the draft is discussing about IPv4 networks (what is mentioned above).

>A network were none of the devices connected to it implement v6.

If that is the case some of the attacks would not be possible.  The 
scenario the draft discusses about is when there are devices which 
have IPv6 support.  The draft could have an explanation about IPv4 
networks (see previous comment) and then follow it with the first 
sentence of Section 1.  It can then go into a discussion of the 
threats and how to mitigate them.

 From Section 1:

   "filtering IPv6 traffic (whether native or transition/co-existence)
    to mitigate IPv6 security implications on IPv4 networks should
   (generally) only be considered as a temporary measure until IPv6
   is deployed."

It's not a temporary measure in the sense that there is an assumption 
that the network should be IPv4 only.  If the network is to support 
IPv4 and IPv6, filtering of IPv6 traffic is not recommended then.

>The reference is meant to illustrate that that even if you think your
>network only employs IPv4 (and hence forget about the v6 support), you
>could be hit by that.

Ok.

>For attacks that employ link-local connectivity, it bolds down to packet
>filtering (either by a personal firewall at the host, or by filtering v6
>at layer-2) -- this is discussed in the I-D.

I don't see anything about that in the draft.  There is a mention of 
filtering at Layer 2 and Layer 3.

>Happy Eyeballs has to do with what you do when you drop packets. If you
>silently drop them, the host may have rely on timeouts rather than
>having a positive indication that a packet has been dropped.

This is a browser issue.  I'll comment further in another message.

>Could you please elaborate?

The text about DNS (Section 4) is about DNS replies.  What I meant 
was that the draft recommends changing the answer for a (DNS) AAAA 
query in an attempt to stop IPv6 traffic.  It's ok to block IPv6 
traffic as it's an IPv4-only network.  I don't think that it is ok to 
tamper with DNS replies (in this case you are covered by local policy 
and you can do that).

>Please see the quotes when we say "'IPv4-only' networks" -- in practice,
>there's no such a thing, and you should think v6 security even if you
>think/want to run an IPv4-only network.

It might help to reword the Abstract and the Introduction Section so 
that the purpose of the document is clear.  I agree that it is good 
to think IPv6 security even if I want an IPv4-only network.

>This one I cannot do much about. :-)

:-)

Regards,
-sm