Re: [OPSEC] [v6ops] draft-ietf-opsec-v6

JORDI PALET MARTINEZ <jordi.palet@consulintel.es> Sat, 30 March 2019 10:43 UTC

Return-Path: <prvs=19925d7c34=jordi.palet@consulintel.es>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9ED81201C6 for <opsec@ietfa.amsl.com>; Sat, 30 Mar 2019 03:43:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=consulintel.es
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id djSE0wRVEdP1 for <opsec@ietfa.amsl.com>; Sat, 30 Mar 2019 03:43:02 -0700 (PDT)
Received: from mail.consulintel.es (mail.consulintel.es [IPv6:2001:470:1f09:495::5]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3F2E120026 for <opsec@ietf.org>; Sat, 30 Mar 2019 03:43:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=consulintel.es; s=MDaemon; t=1553942580; x=1554547380; i=jordi.palet@consulintel.es; q=dns/txt; h=User-Agent:Date: Subject:From:To:Message-ID:Thread-Topic:References:In-Reply-To: Mime-version:Content-type; bh=wN4sp9k5c6ZVHC2Id9LcI5pwd7biGCAte0 mMuLLDlsw=; b=Fd5I0lUaVYmTtLYOyMxIl6JSxqt6PKFkjCI4tgERBxwrT3AKBj BlPIAf3IAYWP+tRLmR/ItbItSS4Wq1bWIzkoEkP8OmXseG0kFjjnPJVSUMGh9x4j pThDsJus7q/xKg6Sl2G8CU5qc5c5dizgXA7H4eCeTaAcsPcvblArqUROg=
X-MDAV-Result: clean
X-MDAV-Processed: mail.consulintel.es, Sat, 30 Mar 2019 11:43:00 +0100
X-Spam-Processed: mail.consulintel.es, Sat, 30 Mar 2019 11:42:58 +0100
Received: from [10.10.10.139] by mail.consulintel.es (MDaemon PRO v16.5.2) with ESMTPA id md50006203378.msg for <opsec@ietf.org>; Sat, 30 Mar 2019 11:42:58 +0100
X-MDRemoteIP: 2001:470:1f09:495:89b:85cd:3d1f:ae66
X-MDHelo: [10.10.10.139]
X-MDArrival-Date: Sat, 30 Mar 2019 11:42:58 +0100
X-Authenticated-Sender: jordi.palet@consulintel.es
X-Return-Path: prvs=19925d7c34=jordi.palet@consulintel.es
X-Envelope-From: jordi.palet@consulintel.es
X-MDaemon-Deliver-To: opsec@ietf.org
User-Agent: Microsoft-MacOutlook/10.10.8.190312
Date: Sat, 30 Mar 2019 11:42:53 +0100
From: JORDI PALET MARTINEZ <jordi.palet@consulintel.es>
To: opsec@ietf.org
Message-ID: <7B027755-3D55-4417-97B5-147DC9348E81@consulintel.es>
Thread-Topic: [v6ops] draft-ietf-opsec-v6
References: <74D0026C-9DB6-43E1-8674-6AEF84D4DFF8@consulintel.es> <3A7EB7FA-EBA4-4BD8-9E62-116641C66AE6@gmail.com>
In-Reply-To: <3A7EB7FA-EBA4-4BD8-9E62-116641C66AE6@gmail.com>
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3636790973_1769206433"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsec/9Qt_T2l-QyL628LweByCYfdnnPo>
Subject: Re: [OPSEC] [v6ops] draft-ietf-opsec-v6
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 Mar 2019 10:43:10 -0000

Sorry about that, just clicked reply!

 

I’m working already, hopefully finish today, to review the other 40 pages. It is a really long document! May be I will break it down in several parts.

 

I will make sure to submit to opsec this time!


Regards,

Jordi

 

 

 

El 30/3/19 11:33, "Fred Baker" <fredbaker.ietf@gmail.com> escribió:

 

This was sent to v6ops instead of opsec



From: JORDI PALET MARTINEZ <jordi.palet=40consulintel.es@dmarc.ietf.org>

Subject: Re: [v6ops] draft-ietf-opsec-v6

Date: March 29, 2019 at 5:13:32 PM GMT+1

To: IPv6 Operations <v6ops@ietf.org>

 

Hi all,

Thanks for the reminder, overdue task for me for a while ... So here is it (partially, as I'm working in the plane, so more in following emails).

2.1.  Addressing Architecture

  Once an address allocation has been assigned, there should be some
  thought given to an overall address allocation plan.  With the
  abundance of address space available, an address allocation may be
  structured around services along with geographic locations, which
  then can be a basis for more structured security policies to permit
  or deny services between geographic regions.

One of MOST frequent issues when you start implementing IPv6 is that people tend to go to their RIR for a default allocation/assignment, and then try to make the addressing plan with what they have, instead of planning correctly and then going to the RIR. The result is many cases is ISPs providing a single /64 to customers, which is really bad.

Also, if the document is for operators and enterprises, you need to differentiate among allocation and assignment.

So, I will like to suggest rewording as:
"A key task before starting an IPv6 deployment, once the sufficient knowledge has been acquired, is to prepare an addressing plan. With the abundance of address space available, an addressing plan may be structured around services along with geographic locations, which then can be a basis for more structured security policies to permit or deny services between geographic regions.

This may be seen as a simple task, but it is an activity within the IPv6 deployment project, that requires a very in depth thinking and it makes sense to invest as much time as required on it. Only once that addressing plan has been designed is the right time to go to the relevant Regional Internet Registry (RIR) to ask for an allocation or an assignment."

Then, in the next p.:

  A common question is whether companies should use Provider
  Independent (PI) vs Provider Allocated (PA) space [RFC7381], but from
  a security perspective there is little difference.

Replace with

"A common question is whether companies should use Provider Independent (PI) vs Provider Allocated (PA) space [RFC7381], but from a security perspective there is little difference. From the RIRs policies perspective, PI space is assigned to organizations if they don't need to sub-assign to third parties, while PA is allocated to operators or organizations that will sub-assign to third parties. For example, a big corporation may have different subsidiaries and they are legally different entities, so in this case each one need their own PI space, or the responsible for the network need to get allocated PA space. A public institution such as a Ministry, may get a PI, if is only for their own use and not for other government institutions, however if it is the government entity managing the network that interconnects several institutions and provide each one their own space, they need to obtain PA space."

And continue with "However, one ..." in a new p.

2.1.1.  Statically Configured Addresses

Nit:
The use of well-known(such
The use of well-known (such

There are many scanning techniques and more to
  come possible, hence, operators should never relly on the 'impossible
  to find because my address is random' paradigm.

I will say:

There are many scanning techniques and more to
  come possible, hence, operators should never relly on the 'impossible
  to find because my address is random' paradigm, even if it is a good practice to have the statically configured addresses randomly distributed across the /64 subnets and use always DNS.

2.1.2.  Use of ULAs

I will add:

"Even if today a network is not connected to Internet, and it looks like it will not be in the future, things change and it is a considerable effort to renumber it. So it may be relevant to obtain an IPv6 PI assignment from the RIR and have a stable addressing space since day one."

2.1.3.  Point-to-Point Links

I disagree with the mention that RFC6164 indicate that /127 is the way. RFC6164 is about "routers must support it". See draft-palet-v6ops-p2p-links (new version coming soon, so may be a reference to it). So I think some rewording is needed here, specially because router vendors sorted out those bugs long time ago.

2.1.4.  Temporary Addresses - Privacy Extensions for SLAAC

I will add, that "In those cases where accounting/auditing/extreme granular security is required, because is impractical to use DHCPv6 due to the lack of support in Android based OSs, link-layer security such as IEEE802.1x may be used."

2.1.6.  DHCP/DNS Considerations

This probably belongs to another section (may be a specific one for DNS), but related:

"If there is a need for Statically Configured Addresses, it should considered using DNS to refer to them, so no hard-coded addresses are used by applications. This facilitates also debugging/troubleshooting as avoids remembering addresses. In may be advisable to have multiple-faced DNS ("views") in order to ensure that internal-only used hosts, aren't published globally and full zone transfers are disallowed."

2.1.7.  Using a /64 per host

I will add:

"This also avoids the need to "proxy" or NAT-like operations if multiple VMs, containers, or similar ones, need their own IPv6 address from a single /64 ."

Regards,
Jordi



El 29/3/19 6:19, "v6ops en nombre de Fred Baker" <v6ops-bounces@ietf.org en nombre de fredbaker.ietf@gmail.com> escribió:

   Yesterday, the authors of an opec draft asked us for comments on their draft, which is in a second WGLC in opec (opsec@ietf.org). You may have missed the character string:

   https://datatracker.ietf.org/doc/draft-ietf-opsec-v6
   https://tools.ietf.org/html/draft-ietf-opsec-v6
     "Operational Security Considerations for IPv6 Networks", Eric Vyncke,
     Chittimaneni Kk, Merike Kaeo, Enno Rey, 2019-03-11,

   I'd encourage people to read it and comment on the opec list.

   --------------------------------------------------------------------------------
   Victorious warriors win first and then go to war,
   Defeated warriors go to war first and then seek to win.
        Sun Tzu

   _______________________________________________
   v6ops mailing list
   v6ops@ietf.org
   https://www.ietf.org/mailman/listinfo/v6ops




**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.



_______________________________________________
v6ops mailing list
v6ops@ietf.org
https://www.ietf.org/mailman/listinfo/v6ops

 

--------------------------------------------------------------------------------

The fact that there is a highway to hell and a stairway to heaven is an interesting comment on projected traffic volume...






**********************************************
IPv4 is over
Are you ready for the new Internet ?
http://www.theipv6company.com
The IPv6 Company

This electronic message contains information which may be privileged or confidential. The information is intended to be for the exclusive use of the individual(s) named above and further non-explicilty authorized disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited and will be considered a criminal offense. If you are not the intended recipient be aware that any disclosure, copying, distribution or use of the contents of this information, even if partially, including attached files, is strictly prohibited, will be considered a criminal offense, so you must reply to the original sender to inform about this communication and delete it.