Re: [Softwires] AD review of draft-ietf-softwire-dual-stack-lite (final part 3)
"Yiu L. Lee" <yiu_lee@cable.comcast.com> Wed, 18 August 2010 19:41 UTC
Return-Path: <yiu_lee@cable.comcast.com>
X-Original-To: softwires@core3.amsl.com
Delivered-To: softwires@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B464F3A698B for <softwires@core3.amsl.com>; Wed, 18 Aug 2010 12:41:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.599
X-Spam-Level:
X-Spam-Status: No, score=-98.599 tagged_above=-999 required=5 tests=[AWL=-0.328, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_NUMERIC_HELO=2.067, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FBrYQ4fo4o96 for <softwires@core3.amsl.com>; Wed, 18 Aug 2010 12:41:01 -0700 (PDT)
Received: from cable.comcast.com (copdcimo01.potomac.co.ndcwest.comcast.net [76.96.32.251]) by core3.amsl.com (Postfix) with ESMTP id 13F1A3A6A59 for <softwires@ietf.org>; Wed, 18 Aug 2010 12:41:01 -0700 (PDT)
Received: from ([147.191.124.13]) by copdcimo01.cable.comcast.com with ESMTP with TLS id 5503630.6825598; Wed, 18 Aug 2010 13:46:52 -0600
Received: from PAOAKEXCSMTP01.cable.comcast.com (10.52.116.30) by copdcexhub02.cable.comcast.com (147.191.124.13) with Microsoft SMTP Server id 14.0.702.0; Wed, 18 Aug 2010 13:41:32 -0600
Received: from PACDCEXCMB04.cable.comcast.com ([24.40.15.86]) by PAOAKEXCSMTP01.cable.comcast.com with Microsoft SMTPSVC(6.0.3790.4675); Wed, 18 Aug 2010 15:41:19 -0400
Received: from 69.241.25.0 ([69.241.25.0]) by PACDCEXCMB04.cable.comcast.com ([24.40.15.86]) via Exchange Front-End Server legacywebmail.comcast.com ([24.40.8.152]) with Microsoft Exchange Server HTTP-DAV ; Wed, 18 Aug 2010 19:41:17 +0000
User-Agent: Microsoft-Entourage/12.26.0.100708
Date: Wed, 18 Aug 2010 15:41:17 -0400
From: "Yiu L. Lee" <yiu_lee@cable.comcast.com>
To: Jari Arkko <jari.arkko@piuha.net>, Alain Durand <adurand@juniper.net>
Message-ID: <C891AF9D.30C1F%yiu_lee@cable.comcast.com>
Thread-Topic: [Softwires] AD review of draft-ietf-softwire-dual-stack-lite (final part 3)
Thread-Index: Acs/DVMCJP4MEmyDy0aFG8o3MAG7DQ==
In-Reply-To: <4C6A83DE.6040807@piuha.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="B_3364990877_1601355"
X-OriginalArrivalTime: 18 Aug 2010 19:41:19.0188 (UTC) FILETIME=[54508940:01CB3F0D]
Cc: "draft-ietf-softwire-dual-stack-lite@tools.ietf.org" <draft-ietf-softwire-dual-stack-lite@tools.ietf.org>, "softwires@ietf.org" <softwires@ietf.org>
Subject: Re: [Softwires] AD review of draft-ietf-softwire-dual-stack-lite (final part 3)
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/softwires>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Aug 2010 19:41:10 -0000
Hi Jari, Comments inline below: On 8/17/10 8:43 AM, "Jari Arkko" <jari.arkko@piuha.net> wrote: > I have now completed my review of the draft. Here are the remaining comments: > > Overall: > > The draft is in relatively good shape. I saw a number of cases where you > should have been more precise in the specification, but those cases can > definitely be corrected. There are a few missing things, but again something > that can be taken care of. > > I am expecting a new revision. > > Technical: > > Shouldn't the draft talk about how a service provider AFTR makes it less > likely that the user can exert control with protocols like UPnP-IGD? You > should bring up this issue up early in the document, and then you can point to > Appendix C for possible future work around that limitation. > > [YL] Do you suggest to put some wording about UPnP-IGD in Section 8? > > What happens if two B4s are chained together, both using the reserved address > range? > > [YL] I am not sure what do you mean by ³chaining the two B4s together². Can > you elaborate? >> >> However, moving the NAT functionality from the home gateway to the >> core of the service provider network and sharing IPv4 addresses among >> customers create additional requirements when logging data for abuse >> usage. With any architecture where an IPv4 address does not uniquely >> represent an end host, IPv4 addresses and a timestamps are no longer >> sufficient to identify a particular broadband customer. Additional >> information such as transport protocol information will be required >> for that purpose. For example, we suggest to log the transport port >> number for TCP and UDP connections. >> > > What needs to be logged depends on the element that you are in. A peer would > log the other side's transport port number, an AFTR would log the line/tunnel > ID and the transport port number. > > [YL] This logging requirement for this specification always focuses on the > AFTR. I think we can make this clear that the AFTR should log the binding > information to support lawful audit. > >> The AFTR performs translation functions for interior IPv4 hosts at >> RFC 1918 addresses or at the IANA reserved address range (TBA by >> IANA). > > How do we know which address range is being used? > > [YL] In fact, this information has to be provisioned in the AFTR. What we > suggested here is at minimum, the AFTR should accept packets sourced only from > RFC1918 and the new IANA reserved address range. > >> If the interior host is properly using the authorized IPv4 >> address with the authorized transport protocol port range such as A+P >> semantic for the tunnel, the AFTR can simply forward without >> translation to permit the authorized address and port range to >> function properly. All packets with unauthorized interior IPv4 >> addresses or with authorized interior IPv4 address but unauthorized >> port range MUST NOT be forwarded by the AFTR. This prevents rogue >> devices from launching denial of service attacks using unauthorized >> public IPv4 addresses in the IPv4 source header field or unauthorized >> transport port range in the IPv4 transport header field. For >> example, rogue devices could bombard a public web server by launching >> TCP SYN ACK attack. The victim will receive TCP SYN from random IPv4 >> source addresses at a rapid rate and deny TCP services to legitimate >> users. > > What is a properly authorized IPv4 address? What about an authorized transport > protocol? > > [YL] If we change the word ³authorized² to ³provisioned². Is this more clear > to you? >> >> If IPv6 address spoofing prevention is not in place, the AFTR should >> perform further sanity checks on the IPv6 address of incoming IPv6 >> packets. For example, it should check if the address has really been >> allocated to an authorized customer. > > How? Isn't address checking of this kind really just another form of spoofing > prevention? > > [YL] What we tried to say is the AFTR must implement ACL type checking to only > accept the IPv6 address range defined in the ACL. > > Editorial: > >> >> The source IPv4 is the RFC1918 <http://tools.ietf.org/html/rfc1918> >> addressed >> assigned by the Dual-Stack home router which is unique to each host >> behind the home gateway. > > ... address assigned ... > >> or >> example, rogue devices could bombard a public web server by launching >> TCP SYN ACK attack. The victim will receive TCP SYN from random IPv4 >> source addresses at a rapid rate and deny TCP services to legitimate >> users. > > Should this be ... launching *a* TCP SYN ACK attack? And maybe add a reference > hree. Also, ... receive a TCP SYN packet from random ... > > [YL] I will add RFC4987 to the reference. > > Thanks, > Yiu > > > > _______________________________________________ > Softwires mailing list > Softwires@ietf.org > https://www.ietf.org/mailman/listinfo/softwires
- [Softwires] AD review of draft-ietf-softwire-dual… Jari Arkko
- Re: [Softwires] AD review of draft-ietf-softwire-… Yiu L. Lee
- Re: [Softwires] AD review of draft-ietf-softwire-… Jari Arkko
- Re: [Softwires] AD review of draft-ietf-softwire-… Alain Durand
- Re: [Softwires] AD review of draft-ietf-softwire-… Alain Durand
- Re: [Softwires] AD review of draft-ietf-softwire-… Alain Durand
- [Softwires] AD review of draft-ietf-softwire-dual… Jari Arkko
- Re: [Softwires] AD review of draft-ietf-softwire-… Jari Arkko
- Re: [Softwires] AD review of draft-ietf-softwire-… Ralph Droms
- Re: [Softwires] AD review of draft-ietf-softwire-… Jari Arkko
- [Softwires] AD review of draft-ietf-softwire-dual… Jari Arkko
- Re: [Softwires] AD review of draft-ietf-softwire-… Yiu L. Lee
- Re: [Softwires] AD review of draft-ietf-softwire-… Yiu L. Lee