Re: IPv6 WG Last Call: <draft-ietf-ipngwg-icmp-name-lookups-12.txt>

Pekka Savola <pekkas@netcore.fi> Mon, 01 August 2005 06:08 UTC

Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DzTTc-0007a7-3Q; Mon, 01 Aug 2005 02:08:40 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1DzTTZ-0007a2-S0 for ipv6@megatron.ietf.org; Mon, 01 Aug 2005 02:08:37 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA21535 for <ipv6@ietf.org>; Mon, 1 Aug 2005 02:08:36 -0400 (EDT)
Received: from netcore.fi ([193.94.160.1]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1DzTzn-0005O8-HM for ipv6@ietf.org; Mon, 01 Aug 2005 02:41:56 -0400
Received: from localhost (pekkas@localhost) by netcore.fi (8.11.6/8.11.6) with ESMTP id j7168P100488 for <ipv6@ietf.org>; Mon, 1 Aug 2005 09:08:25 +0300
Date: Mon, 01 Aug 2005 09:08:25 +0300
From: Pekka Savola <pekkas@netcore.fi>
To: IPv6 WG <ipv6@ietf.org>
In-Reply-To: <6.2.1.2.2.20050715113550.02ab8288@mailhost.iprg.nokia.com>
Message-ID: <Pine.LNX.4.61.0508010907450.467@netcore.fi>
References: <6.2.1.2.2.20050715113550.02ab8288@mailhost.iprg.nokia.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"; format="flowed"
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 944ecb6e61f753561f559a497458fb4f
Subject: Re: IPv6 WG Last Call: <draft-ietf-ipngwg-icmp-name-lookups-12.txt>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "IP Version 6 Working Group \(ipv6\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
Sender: ipv6-bounces@ietf.org
Errors-To: ipv6-bounces@ietf.org

On Fri, 15 Jul 2005, Bob Hinden wrote:
> This starts a two week IPv6 working group last call on advancing:
>
>        Title           : IPv6 Node Information Queries
>        Author(s)       : M. Crawford, B. Haberman
>        Filename        : draft-ietf-ipngwg-icmp-name-lookups-12.txt
>        Pages           : 14
>        Date            : 2005-7-14
>
> to Experimental.  Please send substantive comments to the IPv6 mailing list. 
> Editorial comments can be sent to the authors.

Sorry for missing the DL by a couple of days, but here are my comments 
anyway.

I've been very critical of the node information queries in the past, and
still am, but as it's going to Experimental, I'm not as concerned.  However,
I think there are still a couple of very important things which need to be
settled so that a) it can be used safely and b) it won't jeopardize the real
use of IPv6 ICMP messages.

Specifically, I'm very concerned about its use with global addresses, over
the Internet.  This has a potential to turn into a kitchen sink protocol,
which can be used to do query anything at all from a random node.  This is
exactly the thing that makes want to firewall administrators filter out
all ICMPv6 messages just to be sure messages like this won't be used
in the systems.  I don't think we want that.

I have no objection to having a protocol like this used between consenting
adults between link-local addresses or even global addresses if done over a
single link -- but extending it (or providing extendibility) beyond that
seems unwise.

My suggestion how to deal with this is to:
  - add that a node MUST send all non-link-local node information queries
    with Hop Count 255; HC=255 MAY [or SHOULD] be used with other traffic
    as well; and
  - a node MUST, unless explicitly configured otherwise, discard any node
     information queries w/ non-link-local queries which don't have HC=255.

This only breaks backward compat for node information queries sent w/ global
addresses, over one hop away.  I think we could live with that.  It should
provide a sufficiently simple security model for ensuring NIQ's won't be
used inappropriately.

A couple of specific comments below:

substantial
-----------

    The mechanisms defined in this document may have wider applicability
    in the future (for example, name lookups in zero configuration
    networks, global reverse name lookups, etc.), but any use beyond
    debugging and diagnostic tools is left for further study and is
    beyond the scope of this document.

==> it seems inappropriate to mention these non-usages in this document,
especially "global reverse name lookups"; I'd remove that at the very least.

   The Nonce should be a random or good pseudo-random value to foil
    spoofed replies.  An implementation which allows multiple independent
    processes to send NI queries MAY use the Nonce value to deliver
    Replies to the correct process.  Nonetheless, such processes MUST
    check the received Nonce and ignore extraneous Replies.

==> the "should" should be stronger.  I suggest a MUST, because it's
essential for the security.  Otherwise, there needs to be much more text on
not assuming the nonce provides any security.

6.1  NOOP

    This NI type has no defined flags and never has a Data field.  A
    Reply to an NI NOOP Query tells the Querier that a node with the
    Queried Address is up and reachable, implements the Node Information
    protocol, and incidentally happens to reveal whether the Queried
    Address was an anycast address. [...]

==> The last sentence may require rewording as I guess whether it's revealed
or not depends on which version of addr-arch is implemented..?

    This protocol has the potential of revealing information useful to a
    would-be attacker.  An implementation of this protocol SHOULD have a
    default configuration which refuses to answer queries from global-
    scope [3] addresses.

==> I'd say a MUST here, instead of a SHOULD.

editorial
---------

    the domain.  Where necessary, the cases of fully-qalified and single-
    label names will be distinguished.

==> s/qali/quali/

    If true communication security is required, IPsec [12] MUST be used.
    Providing the infrastructure to authenticate NI Queries and Replies
    may be quite difficult outside of a well-defined community.

==> this case seems a bit like an operational recommendation or something
other than an implementation & interop issue, so uppercasing a MUST may be a
bit inappropriate.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------