Re: [OPSEC] 3 Volunteers wanted - Draft: draft-gont-opsec-ipv6-implications-on-ipv4-nets

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Tue, 14 August 2012 08:42 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E86E21F85F4; Tue, 14 Aug 2012 01:42:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.143
X-Spam-Level:
X-Spam-Status: No, score=-10.143 tagged_above=-999 required=5 tests=[AWL=-0.145, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I2E7zjEgcvTE; Tue, 14 Aug 2012 01:42:47 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) by ietfa.amsl.com (Postfix) with ESMTP id 6635521F85FC; Tue, 14 Aug 2012 01:42:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=evyncke@cisco.com; l=23704; q=dns/txt; s=iport; t=1344933767; x=1346143367; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=3CbcGoBYiEPBX4HIjQIEuJ5N0OUtnyusKF6I8rBzGiI=; b=Dv1uSAQxmUbWsjsDzkvXAkzIYYFL/I849B4iJj6+eqWx+Vib0nqMaPZy s1jwdQkGlvxzmEIax0Chk9HvHuf7PwFSSnmqzE0qbXvdIN6aaYLTxa25K iZTxARJbRDqH0LepSqG2smJNSbmBGZVSDCR2rvGWqgVOfFONl/251/KvU M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgAFAP4OKlCtJV2c/2dsb2JhbAA6CoJKt0SBB4IgAQEBBBIBGkwQAgEIEQQBAQsWBwcyFAkIAQEEAQ0FCAwOh2uYJaEJiwUQhUFgA4gZm1yBZoJfgV8
X-IronPort-AV: E=Sophos; i="4.77,765,1336348800"; d="scan'208,217"; a="111360488"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-3.cisco.com with ESMTP; 14 Aug 2012 08:42:44 +0000
Received: from xhc-aln-x09.cisco.com (xhc-aln-x09.cisco.com [173.36.12.83]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id q7E8ghlA004571 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 14 Aug 2012 08:42:44 GMT
Received: from xmb-aln-x02.cisco.com ([169.254.5.72]) by xhc-aln-x09.cisco.com ([173.36.12.83]) with mapi id 14.02.0298.004; Tue, 14 Aug 2012 03:42:43 -0500
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Gunter Van de Velde (gvandeve)" <gvandeve@cisco.com>, "opsec@ietf.org" <opsec@ietf.org>, "v6ops v6ops WG (v6ops@ietf.org)" <v6ops@ietf.org>
Thread-Topic: [OPSEC] 3 Volunteers wanted - Draft: draft-gont-opsec-ipv6-implications-on-ipv4-nets
Thread-Index: Ac1zrndn+rK+MesNRpua2q1lf71ApgGSKfgw
Date: Tue, 14 Aug 2012 08:42:42 +0000
Message-ID: <97EB7536A2B2C549846804BBF3FD47E10C3A2A@xmb-aln-x02.cisco.com>
References: <67832B1175062E48926BF3CB27C49B240674C2@xmb-aln-x12.cisco.com>
In-Reply-To: <67832B1175062E48926BF3CB27C49B240674C2@xmb-aln-x12.cisco.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.55.185.71]
x-tm-as-product-ver: SMEX-10.2.0.1135-7.000.1014-19112.003
x-tm-as-result: No--57.735900-8.000000-31
x-tm-as-user-approved-sender: No
x-tm-as-user-blocked-sender: No
Content-Type: multipart/alternative; boundary="_000_97EB7536A2B2C549846804BBF3FD47E10C3A2Axmbalnx02ciscocom_"
MIME-Version: 1.0
Cc: Fernando Gont <fgont@si6networks.com>
Subject: Re: [OPSEC] 3 Volunteers wanted - Draft: draft-gont-opsec-ipv6-implications-on-ipv4-nets
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/opsec>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Aug 2012 08:42:50 -0000

Fernando and Gunter,

Sorry for belated comments... I agree with most comments from other reviewers of course (esp Panos).  I have two classes of comments: generic and details.

Let's start with generic:

-       It should not be a BCP but rather informational

-       I also wonder whether it is worth an IETF RFC because it is well known topics in the security area (as you probably know)

-       Missing point: awareness of IPV6 by CISO is the key problem, should also add that IPv6 is not dangerous per se, and enabling IPv6 in intranet is a good way to bypass all automatic tunnels

-       Intro / title should specify 'end-user network' (to avoid confusion for ISP)

-       IP flow (netflow), firewall log, DNS request log could also be monitored to detect tunnels establishments

-       Using NAPT (and not NAT as previously commented) usually blocks 'magically' IP protocol 41 and most tunnels

-       If the security policy is to force all traffic through application proxies (done by all major organizations) then tunnels are not a threat

Let's continue with the details:

-       1.0 please avoid all discussion about NAPT being 'minimal/simple' security, the days of scanning are over and have been replaced by malware download/email propagated

-       2.0 congruent security policy indeed with the exception of RFC 4890 (ICMPv6)

-       2.1 filtering the IPv6 ethertype is TOO dangerous (= could break too many things) to be recommended in an IETF document

-       3.1 should refer to the RFC

-       3.3 AFAIK there is no by default implementation of 6RD in generic OS and it requires either manual configuration or DHCPv4 option => remove this section

-       3.5 leave ISATAP (automatic config through DNS) but specify that blocking 41 also blocks it

-       3.6 as noted, Teredo default port can be changed. The good recommendation anyway for enterprises is to block outbound UDP traffic (except some pin holes for DNS of course), even my employer network blocks them since 1997 ;-). Also, Microsoft implementation disables Teredo when personal firewall is disabled or when the host is in an Active Directory network

-       Other tunnels TSP (but also Sixxs, ...) all require explicit installation and configuration by end-users. They are no more a thread than any other covert channel (being IP over DNS or over ICMP or ...), I would remove this section

Hope this helps

-éric

From: opsec-bounces@ietf.org [mailto:opsec-bounces@ietf.org] On Behalf Of Gunter Van de Velde (gvandeve)
Sent: lundi 6 août 2012 10:43
To: opsec@ietf.org; v6ops v6ops WG (v6ops@ietf.org)
Subject: [OPSEC] 3 Volunteers wanted - Draft: draft-gont-opsec-ipv6-implications-on-ipv4-nets

Dear all,

Can I request the WG members for 3 volunteers to read the draft draft-gont-opsec-ipv6-implications-on-ipv4-nets and provide feedback to the list?

This will help the OPSEC chairs to identify if the work is ready for WG adoption or not. The work targets are within charter of the WG, and seems to be interesting work for the community.

Questions we are looking answers for:


1)      Should it be targeted BCP or Informational?

2)      Is the work quality ok to be accepted as WG document?

3)      Is the topic inline with the OPSEC charter?

4)      Any missing or over-described points?

Many thanks in advance,

Kind Regards,
OPSEC Chairs,
(G/, KK, Warren)