Re: Last Call: <draft-ietf-opsec-ipv6-implications-on-ipv4-nets-03.txt> (Security Implications of IPv6 on IPv4 Networks) to Informational RFC

Fernando Gont <fgont@si6networks.com> Mon, 01 April 2013 17:59 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CAE81F0D1E for <ietf@ietfa.amsl.com>; Mon, 1 Apr 2013 10:59:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.393
X-Spam-Level:
X-Spam-Status: No, score=-0.393 tagged_above=-999 required=5 tests=[AWL=2.163, BAYES_00=-2.599, DATE_IN_PAST_03_06=0.044]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M22ipfKYLMTX for <ietf@ietfa.amsl.com>; Mon, 1 Apr 2013 10:59:48 -0700 (PDT)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:d10:2000:e::3]) by ietfa.amsl.com (Postfix) with ESMTP id 9E4F01F0D21 for <ietf@ietf.org>; Mon, 1 Apr 2013 10:59:48 -0700 (PDT)
Received: from [186.134.3.135] (helo=[192.168.123.121]) by web01.jbserver.net with esmtpsa (TLSv1:DHE-RSA-CAMELLIA256-SHA:256) (Exim 4.80.1) (envelope-from <fgont@si6networks.com>) id 1UMj1A-0003a1-Lw; Mon, 01 Apr 2013 19:59:41 +0200
Message-ID: <51598243.2020109@si6networks.com>
Date: Mon, 01 Apr 2013 09:49:07 -0300
From: Fernando Gont <fgont@si6networks.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130308 Thunderbird/17.0.4
MIME-Version: 1.0
To: SM <sm@resistor.net>
Subject: Re: Last Call: <draft-ietf-opsec-ipv6-implications-on-ipv4-nets-03.txt> (Security Implications of IPv6 on IPv4 Networks) to Informational RFC
References: <20130329130326.13012.1402.idtracker@ietfa.amsl.com> <6.2.5.6.2.20130330230305.0bce91a8@resistor.net>
In-Reply-To: <6.2.5.6.2.20130330230305.0bce91a8@resistor.net>
X-Enigmail-Version: 1.4.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Apr 2013 17:59:49 -0000

SM,

On 03/31/2013 06:29 AM, SM wrote:
>> The IESG plans to make a decision in the next few weeks, and solicits
>> final comments on this action. Please send substantive comments to the
>> ietf@ietf.org mailing lists by 2013-04-12. Exceptionally, comments may be
> 
> From Section 6:
> 
>   "In general, the possible mitigations boil down to enforcing on native
>    IPv6 and IPv6 transition/co-existence traffic the same security
>    policies currently enforced for IPv4 traffic, and/or blocking the
>    aforementioned traffic when it is deemed as undesirable."
> 
> My reading of the mitigation is that it comes down to block everything
> IPv6.  The draft seems to treat every network as a military operation
> network.

Please re-read the above paragraph -- you missed the part that says
"...the same security policies".



> In the Section 1:
> 
>   "Native IPv6 support could also possibly lead to VPN traffic leakages
>    when hosts employ VPN software that not only does not support IPv6,
>    but that does nothing about IPv6 traffic.
>    [I-D.ietf-opsec-vpn-leakages] describes this issue, along with
>    possible mitigations."
> 
> I don't understand the relationship between the above and "IPv4-only"
> networks.

Those issues are not present when your network employs v4-only.



> From Section 2:
> 
>  "This means that even if a network is expected to be IPv4-only,
>   much of its infrastructure is nevertheless likely to be
>   IPv6 enabled."
> 
> What is an IPv4-only network?

A network were none of the devices connected to it implement v6.



>   "[CORE2007] is a security advisory about a buffer overflow which
>    could be remotely-exploited by leveraging link-local IPv6
>    connectivity that is enabled by default."
> 
> How is this attack mitigated within the context of the draft?

The reference is meant to illustrate that that even if you think your
network only employs IPv4 (and hence forget about the v6 support), you
could be hit by that.



>   "Additionally, unless appropriate measures are taken, an attacker with
>    access to an 'IPv4-only' local network could impersonate a local
>    router and cause local hosts to enable their 'non-link-local' IPv6
>    connectivity (e.g. by sending Router Advertisement messages),
>    possibly circumventing security controls that were enforced only on
>    IPv4 communications."
> 
> Where is the mitigation for this?

For attacks that employ link-local connectivity, it bolds down to packet
filtering (either by a personal firewall at the host, or by filtering v6
at layer-2) -- this is discussed in the I-D.



> From Section 4:
> 
>   "IPv6 deployments in the Internet are continually increasing"
> 
> I am no longer worried about IPv6 deployment as the OPSEC working group
> has a plan to stop that. :-)
> 
>   'Upstream filtering of transition technologies or situations
>    where a mis-configured node attempts to "provide" native IPv6
>    service on a given network without proper upstream IPv6 connectivity
>    may result in hosts attempting to reach remote nodes via IPv6, and
>    depending on the absence or presence and specific implementation
>    details of "Happy Eyeballs" [RFC6555], there might be a non-trivial
>    timeout period before the host falls back to IPv4 [Huston2010a]
>   [Huston2012].'
> 
> I don't see what "Happy Eyeballs" has to do with operational security.

Happy Eyeballs has to do with what you do when you drop packets. If you
silently drop them, the host may have rely on timeouts rather than
having a positive indication that a packet has been dropped.



>   "For this reason, networks attempting to prevent IPv6 traffic from
>    traversing their devices should consider configuring their local
>    recursive DNS servers to respond to queries for AAAA DNS records with
>    a DNS RCODE of 3 (NXDOMAIN) [RFC1035] or to silently ignore such
>    queries, and should even consider filtering AAAA records at the
>    network ingress point to prevent the internal hosts from attempting
>    their own DNS resolution."
> 
> The above breaks DNS in an attempt to remove everything IPv6 related
> from the network.

Could you please elaborate?



> The title of the draft is "Security Implications of IPv6 on IPv4
> Networks".  The Abstract mentions "IPv4-only" networks.  The
> Introduction Section mentions "networks that are assumed to be
> IPv4-only".

Please see the quotes when we say "'IPv4-only' networks" -- in practice,
there's no such a thing, and you should think v6 security even if you
think/want to run an IPv4-only network.


> I don't understand what this draft is about.

This one I cannot do much about. :-)

-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492