Re: [Softwires] Fwd: New Version Notification for draft-chen-softwire-4rd-u-comment-00.txt

Rémi Després <despres.remi@laposte.net> Wed, 11 April 2012 15:06 UTC

Return-Path: <despres.remi@laposte.net>
X-Original-To: softwires@ietfa.amsl.com
Delivered-To: softwires@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B090D11E815A for <softwires@ietfa.amsl.com>; Wed, 11 Apr 2012 08:06:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.128
X-Spam-Level:
X-Spam-Status: No, score=-2.128 tagged_above=-999 required=5 tests=[AWL=0.171, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WwMlSdhnlbyf for <softwires@ietfa.amsl.com>; Wed, 11 Apr 2012 08:06:41 -0700 (PDT)
Received: from smtp1-g21.free.fr (smtp1-g21.free.fr [IPv6:2a01:e0c:1:1599::10]) by ietfa.amsl.com (Postfix) with ESMTP id 6932F11E814E for <softwires@ietf.org>; Wed, 11 Apr 2012 08:06:23 -0700 (PDT)
Received: from [IPv6:2a01:e35:8a6d:d900:129a:ddff:fe6b:c6fb] (unknown [IPv6:2a01:e35:8a6d:d900:129a:ddff:fe6b:c6fb]) by smtp1-g21.free.fr (Postfix) with ESMTP id 974C2940139; Wed, 11 Apr 2012 17:06:15 +0200 (CEST)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary="Apple-Mail-2--632711443"
From: Rémi Després <despres.remi@laposte.net>
In-Reply-To: <CAFUBMqVxjZkGos7j2RsCnJCwvO5DmPVooB=O7PTuBYbJAbzXfw@mail.gmail.com>
Date: Wed, 11 Apr 2012 17:06:13 +0200
Message-Id: <D3CEC27A-D02D-43AF-9285-542BD3FA4855@laposte.net>
References: <20120410094728.8936.48011.idtracker@ietfa.amsl.com> <CAFUBMqXjnUK+-9eA4WwY27x_kkdNWO7vAJCYDpJk5jfd2K81xQ@mail.gmail.com> <69317BAA-F913-4484-898A-0EBC0238121F@laposte.net> <CAFUBMqVxjZkGos7j2RsCnJCwvO5DmPVooB=O7PTuBYbJAbzXfw@mail.gmail.com>
To: Maoke <fibrib@gmail.com>
X-Mailer: Apple Mail (2.1084)
Cc: Softwires-wg <softwires@ietf.org>
Subject: Re: [Softwires] Fwd: New Version Notification for draft-chen-softwire-4rd-u-comment-00.txt
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/softwires>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Apr 2012 15:06:44 -0000

Le 2012-04-11 à 15:44, Maoke a écrit :

> 
> postpone other parts, but focus on the checksum issue. 
> 2012/4/11 Rémi Després despres.remi@laposte.net
>  
> 5.4 Impact c. - it is true that, in the IPv6 packet of a tunneled ICMPv4 message, the ICMPv4 checksum doesn't ensure IPv6 address integrity. But this integrity can be ensured at tunnel exit by checking that CNPs do preserve checksum neutrality. This can be clarified by a complement in the 4rd-u security section.
>  
>  
> 1. this introduces another new semantics/logic of protocol stack processing at exit CE. it is really hard to call it either IPv4 or IPv6. 

How it is called is IMHO secondary, what is a fact is that it ensures address security. 
 
> 2. even though this CNP works for the address integrity,

(which was the listed point)

> unfortunately, however, the checksum still provides integrity protection for packet length and payload protocol type in both IPv4/ICMPv4 pair and IPv6/ICMPv6 pair. they are involved either in IPv4 header checksum or in ICMPv6 checksum, which covers the pseudo-header of IPv6. 


> how could CNP protect these?

No way, of course.
(Are we now in the technical discussion, or still in deliberate controversy?).

> thanks for mentioning CNP here.

> i need to modify the concern for "address integrity" to the concern for "integrity of addresses, packet length and payload protocol type".

- Addresses have been covered AFAIAC.
- No test scenario I can imagine can reveal an ICMPv4 security problem concerning protocol type or packet length. (A simulated hardware failure would AFAIK be needed, and with that, many other security problems can be considered to exist.) 
=> Unless you come up with new facts, end of this subject for me.

RD







>  
> - maoke