Re: [OPSEC] Ted Lemon's Discuss on draft-ietf-opsec-dhcpv6-shield-05: (with DISCUSS and COMMENT)

"C. M. Heard" <heard@pobox.com> Tue, 10 February 2015 19:14 UTC

Return-Path: <heard@pobox.com>
X-Original-To: opsec@ietfa.amsl.com
Delivered-To: opsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 785E21A1BC6 for <opsec@ietfa.amsl.com>; Tue, 10 Feb 2015 11:14:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.121
X-Spam-Level:
X-Spam-Status: No, score=-1.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8IHdJilA4hBY for <opsec@ietfa.amsl.com>; Tue, 10 Feb 2015 11:14:47 -0800 (PST)
Received: from shell4.bayarea.net (shell4.bayarea.net [209.128.82.1]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B6171A7029 for <opsec@ietf.org>; Tue, 10 Feb 2015 11:14:43 -0800 (PST)
Received: (qmail 26887 invoked from network); 10 Feb 2015 11:14:37 -0800
Received: from shell4.bayarea.net (209.128.82.1) by shell4.bayarea.net with (DHE-RSA-AES256-SHA encrypted) SMTP; 10 Feb 2015 11:14:37 -0800
Date: Tue, 10 Feb 2015 11:14:37 -0800
From: "C. M. Heard" <heard@pobox.com>
X-X-Sender: heard@shell4.bayarea.net
To: Fernando Gont <fgont@si6networks.com>
In-Reply-To: <54DA500C.5070908@si6networks.com>
Message-ID: <Pine.LNX.4.64.1502101048320.4072@shell4.bayarea.net>
References: <20150207194616.20651.30892.idtracker@ietfa.amsl.com> <Pine.LNX.4.64.1502081734120.24776@shell4.bayarea.net> <97C8D14E-D440-4625-8F26-83AF26917CF2@nominum.com> <54D83E7F.3040207@gmail.com> <E478028B-8FFC-47B4-B12D-F0A32227A726@nominum.com> <54D83FCE.4070804@qti.qualcomm.com> <Pine.LNX.4.64.1502082137570.16054@shell4.bayarea.net> <96CE509D-3B6E-49B8-98F6-CB8581787D7E@nominum.com> <Pine.LNX.4.64.1502090708270.22936@shell4.bayarea.net> <174AA530-3993-4894-BCE7-2AE8818EB35E@nominum.com> <54D8F98D.1030101@si6networks.com> <B3474476-3FA1-484E-BAAD-E7A6474BA11C@nominum.com> <54D90EE5.2060002@gmail.com> <5C9CF492-A795-4023-BB91-28B1B52706E4@nominum.com> <54D92987.2080505@gmail.com> <CDA3CF60-BB2E-4F77-B325-B3057C01FBD1@nominum.com> <Pine.LNX.4.64.1502091713320.26279@shell4.bayarea.net> <FFC8BDEA-51BB-4D18-8240-F360CD9A7566@nominum.com> <54D98F62.4080508@bogus.com> <ADCFDFED-5EF9-4121-A323-562C1E33C2F5@nominum.com> <54DA500C.5070908@si6networks.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Archived-At: <http://mailarchive.ietf.org/arch/msg/opsec/pi6Zdu2FIf6BGx54b0kWG0aVnj8>
Cc: "draft-ietf-opsec-dhcpv6-shield@ietf.org" <draft-ietf-opsec-dhcpv6-shield@ietf.org>, Pete Resnick <presnick@qti.qualcomm.com>, "opsec@ietf.org" <opsec@ietf.org>, "draft-ietf-opsec-dhcpv6-shield.ad@ietf.org" <draft-ietf-opsec-dhcpv6-shield.ad@ietf.org>, "draft-ietf-opsec-dhcpv6-shield.shepherd@ietf.org" <draft-ietf-opsec-dhcpv6-shield.shepherd@ietf.org>, Ted Lemon <Ted.Lemon@nominum.com>, "opsec-chairs@ietf.org" <opsec-chairs@ietf.org>, Brian E Carpenter <brian.e.carpenter@gmail.com>, The IESG <iesg@ietf.org>
Subject: Re: [OPSEC] Ted Lemon's Discuss on draft-ietf-opsec-dhcpv6-shield-05: (with DISCUSS and COMMENT)
X-BeenThere: opsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: opsec wg mailing list <opsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsec>, <mailto:opsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/opsec/>
List-Post: <mailto:opsec@ietf.org>
List-Help: <mailto:opsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsec>, <mailto:opsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Feb 2015 19:14:48 -0000

On Tue, 10 Feb 2015, Fernando Gont wrote:
> On 02/10/2015 02:48 PM, Ted Lemon wrote:
> > Ideally, such devices should be configurable with a list of protocol
> > header identifiers so that if new transport protocols are
> > standardized after the device is released, they can be added to the
> > list of protocol header types that the device recognizes.  Since any
> > protocol header that is not a UDP header would be passed by the
> > DHCPv6 shield algorithm, this would allow such devices to avoid
> > blocking the use of new transport protocols.
> 
> So in summary, this argues in favor of DHCPv6-Shield not having only a
> hardcoded list of protocols/EHs that it should pass, but to also allow
> that list to be expanded, so to speak, right?
> 
> If so, that's sensible, too. The only thing that I'd probably change is
> s/transport protocols/Next Header values that do not represent Extension
> Headers/, since it's more general (e.g., something new protocol ala
> ICMPv6 should be passed.. but ICMPv6 is not a transport protocol).

Yes indeed, the problems we've been arguing about all get solved 
satisfactorily if the device sports a table that allows each of the 
undefined Next Header values to be be treated either as identifying 
either an upper-layer protocol, which should be passed, or as an 
extension header that follows the rules of RFC 6564, which can be 
skipped while parsing the header chain.

For the purposes of this discussion, "undefined Next Header values" 
means the values in the Protocol Numbers registry 
(http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml) 
that at the time of implementation are unassigned, PLUS the 
experimental values 253 and 254 (which could be either an 
experimental extension header or an experimental protocol), PLUS the 
reserved value 255.  Currently that would be 143 and up.

> > When an implementation must stop searching for recognizable header
> > types in a packet due to such limitations, whether the device passes
> > or drop that packet SHOULD be configurable.

I would say MUST be configurable, otherwise it cannot comply with 
RFC 7045.

> Should we say anything about the default setting? From a security
> standpoint, it shoudl clearly default to "drop".. otherwise
> DHCPv6-Shield would be easily evasible by inserting an appropriate
> number of IPv6 EHs.

I would be fine with lifting the agnostic "the default configuration 
MAY drop such packets" from RFC 7045 but I am not wedded to this.

//cmh