Re: [OPSEC] ICMP/ICMPv6 network ingress filtering (Fwd: New Version Notification for draft-gont-opsec-icmp-ingress-filtering-00.txt)

Fernando Gont <fgont@si6networks.com> Thu, 11 September 2014 10:34 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D97D21A06D3 for <opsec@ietfa.amsl.com>; Thu, 11 Sep 2014 03:34:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yq8b5SJc-rXr for <opsec@ietfa.amsl.com>; Thu, 11 Sep 2014 03:34:15 -0700 (PDT)
Received: from web01.jbserver.net (web01.jbserver.net [IPv6:2a00:8240:6:a::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B7D51A06C7 for <opsec@ietf.org>; Thu, 11 Sep 2014 03:34:14 -0700 (PDT)
Received: from [2001:5c0:1000:a::1447] by web01.jbserver.net with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128) (Exim 4.84) (envelope-from <fgont@si6networks.com>) id 1XS1hV-0002NB-Vd; Thu, 11 Sep 2014 12:34:06 +0200
Message-ID: <54117073.9050206@si6networks.com>
Date: Thu, 11 Sep 2014 06:50:43 -0300
From: Fernando Gont <fgont@si6networks.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.0
MIME-Version: 1.0
To: Vic Liu <liuzhiheng@chinamobile.com>, opsec@ietf.org
References: <003601cfcd6e$9f4af4a0$dde0dde0$@chinamobile.com>
In-Reply-To: <003601cfcd6e$9f4af4a0$dde0dde0$@chinamobile.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
Archived-At: http://mailarchive.ietf.org/arch/msg/opsec/T6rZkC27m__d4EwN4_Cj4sWQR-g
Subject: Re: [OPSEC] ICMP/ICMPv6 network ingress filtering (Fwd: New Version Notification for draft-gont-opsec-icmp-ingress-filtering-00.txt)
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Sep 2014 10:34:18 -0000

Hi, Vic,

Thanks so much for your feedback! -- Please find my comments in-line...

On 09/11/2014 12:15 AM, Vic Liu wrote:
> 
> I read the document and think it is important work.  In particular, I
> would be very glad to see this type of filtering implemented in CPE
> devices.  Are you aware if Linux implements this?

Don't recall if I ever checked. But I will, and will come back to you.


> Section 4 should clarify that this filtering must be performed on icmp
> error messages.  Document says 'SHOULD perform ingress filtering on the
> Destination Address of the IP packet embedded in the ICMP payload', but
> this does not apply to other icmp messages like icmp echo request and reply.

You're right. We will update the text to:

   IP nodes enforcing IP ingress filtering SHOULD perform ingress
   filtering on the Destination Address of the IP packets embedded in
   the payload of ICMP error messages.


Thanks!

Best regards,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492