Re: [tcpm] feedcback on tcp-secure-05

Fernando Gont <fernando@gont.com.ar> Sat, 15 July 2006 21:05 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1G1rKW-0004lG-Ey; Sat, 15 Jul 2006 17:05:40 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G1rKV-0004d3-Hb for tcpm@ietf.org; Sat, 15 Jul 2006 17:05:39 -0400
Received: from venus.xmundo.net ([201.216.232.56]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1rKT-0001ZK-T6 for tcpm@ietf.org; Sat, 15 Jul 2006 17:05:39 -0400
Received: from fgont.gont.com.ar (171-180-231-201.fibertel.com.ar [201.231.180.171]) (authenticated bits=0) by venus.xmundo.net (8.12.11/8.12.11) with ESMTP id k6FL5XJx022661; Sat, 15 Jul 2006 18:05:36 -0300
Message-Id: <7.0.1.0.0.20060715162015.085dce90@gont.com.ar>
X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0
Date: Sat, 15 Jul 2006 16:27:00 -0300
To: Joe Touch <touch@ISI.EDU>, tcpm@ietf.org
From: Fernando Gont <fernando@gont.com.ar>
Subject: Re: [tcpm] feedcback on tcp-secure-05
In-Reply-To: <44B682AB.9010702@isi.edu>
References: <44B682AB.9010702@isi.edu>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32
Cc:
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Errors-To: tcpm-bounces@ietf.org

At 14:28 13/07/2006, Joe Touch wrote:

>The doc should also indicate that preventing these attacks does NOT
>prevent ICMP attacks (and cite Gont's draft in this regard); it would be
>useful for the security considerations to address whether ICMPs should
>be blocked altogether and what the impact of that would be. Without such
>blocking, it's not clear what the utility of this solution would be.

I disagree with having the security considerations section of a 
document that does not focus on ICMP to basically propose to eliminate ICMP.

There's an entire document of this very same WG dicussing the 
relationship between ICMP and TCP.

Kindest regards,

--
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1






_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www1.ietf.org/mailman/listinfo/tcpm