Re: [v6ops] Hmm. Interesting article...

Tim Chown <tjc@ecs.soton.ac.uk> Thu, 04 February 2016 12:44 UTC

Return-Path: <tjc@ecs.soton.ac.uk>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 823F11B2E52 for <v6ops@ietfa.amsl.com>; Thu, 4 Feb 2016 04:44:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.222
X-Spam-Level:
X-Spam-Status: No, score=-1.222 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.001, SPF_NEUTRAL=0.779] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NTvO3VP6HS3j for <v6ops@ietfa.amsl.com>; Thu, 4 Feb 2016 04:44:02 -0800 (PST)
Received: from falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [IPv6:2001:630:d0:f102::25e]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2ED741B2E50 for <v6ops@ietf.org>; Thu, 4 Feb 2016 04:44:02 -0800 (PST)
Received: from falcon.ecs.soton.ac.uk (localhost [127.0.0.1]) by falcon.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id u14ChdEm003090; Thu, 4 Feb 2016 12:43:39 GMT
X-DKIM: Sendmail DKIM Filter v2.8.2 falcon.ecs.soton.ac.uk u14ChdEm003090
DKIM-Signature: v=1; a=rsa-sha1; c=simple/simple; d=ecs.soton.ac.uk; s=201304; t=1454589825; bh=rWdaDLI1VZdSr5TpBAmDimsuNBc=; h=Mime-Version:Subject:From:In-Reply-To:Date:Cc:References:To; b=4yheUujREztPaUv3Zg4xTi/dNHyGgK37OChayYFanzSSgFfA4vloZSuj065DxjUPu 7jmj6KX2oWfnscwk4G2KS1VtxppviTKikfTxQe+YjNFj9W8oHlF8aBthhi1E6anURI T2K/ES1fU0XFMkGT2q6mW1MDgfM1giDAMwv6844M=
Received: from gander.ecs.soton.ac.uk ([2001:630:d0:f102:250:56ff:fea0:401]) by falcon.ecs.soton.ac.uk (falcon.ecs.soton.ac.uk [2001:630:d0:f102:250:56ff:fea0:68da]) envelope-from <tjc@ecs.soton.ac.uk> with ESMTP (valid=N/A) id s13Chd1791807560yk ret-id none; Thu, 04 Feb 2016 12:43:45 +0000
Received: from [192.168.0.10] (tchowndsl.claranet.co.uk [212.188.254.49]) (authenticated bits=0) by gander.ecs.soton.ac.uk (8.13.8/8.13.8) with ESMTP id u14ChKNc001501 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 4 Feb 2016 12:43:21 GMT
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\))
From: Tim Chown <tjc@ecs.soton.ac.uk>
In-Reply-To: <1FE3E9E6-57B8-40E8-AE4D-5CA181F07F88@cisco.com>
Date: Thu, 04 Feb 2016 12:43:20 +0000
Content-Transfer-Encoding: quoted-printable
Message-ID: <EMEW3|780b1c40a062199b127fa8402ca7ac17s13Chd03tjc|ecs.soton.ac.uk|29A110F0-7F24-4F2C-B992-B42D4E385108@ecs.soton.ac.uk>
References: <165F7549-2A4C-44C3-9FBA-3AF69DE50110@cisco.com> <CAHw9_iLDjyZ6CKUjcyqUBe3-_EJxDekG7a1cPVLpF_U9tVvUgQ@mail.gmail.com> <56AFD626.1000802@bogus.com> <FBABBC18-CFFA-46C9-A63C-B86FE2CFFC94@cisco.com> <6EB29183-FA9A-4B94-BD68-115DB190FE65@delong.com> <56B06129.7090301@si6networks.com> <657448B4-4F56-445A-8862-8E0EB8D1A8B2@delong.com> <56B0BE2B.5050408@si6networks.com> <D2D633A9.D612D%Lee.Howard@twcable.com> <7A88E510-8A39-4765-A762-E855B9ACBDFF@ecs.soton.ac.uk> <EMEW3|48c0728de4c77e844da42a157e2bc520s11IVo03tjc|ecs.soton.ac.uk|7A88E510-8A39-4765-A762-E855B9ACBDFF@ecs.soton.ac.uk> <1FE3E9E6-57B8-40E8-AE4D-5CA181F07F88@cisco.com> <29A110F0-7F24-4F2C-B992-B42D4E385108@ecs.soton.ac.uk>
To: "Fred Baker (fred)" <fred@cisco.com>
X-Mailer: Apple Mail (2.3112)
X-ECS-MailScanner: Found to be clean, Found to be clean
X-smtpf-Report: sid=s13Chd179180756000; tid=s13Chd1791807560yk; client=relay,forged,no_ptr,ipv6; mail=; rcpt=; nrcpt=4:0; fails=0
X-ECS-MailScanner-Information: Please contact the ISP for more information
X-ECS-MailScanner-ID: u14ChdEm003090
X-ECS-MailScanner-From: tjc@ecs.soton.ac.uk
Archived-At: <http://mailarchive.ietf.org/arch/msg/v6ops/28KQlEJkSWuVepbuonRqHlsLALE>
Cc: Fernando Gont <fgont@si6networks.com>, "v6ops@ietf.org" <v6ops@ietf.org>
Subject: Re: [v6ops] Hmm. Interesting article...
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Feb 2016 12:44:03 -0000

> On 2 Feb 2016, at 18:45, Fred Baker (fred) <fred@cisco.com> wrote:
> 
> 
>> On Feb 2, 2016, at 10:31 AM, Tim Chown <tjc@ecs.soton.ac.uk> wrote:
>> 
>>> There is an unaddressed tension here.
>>> I think one view is that IPv6 should be deployed without firewalls so all
>>> hosts are reachable from arbitrary other hosts on the Internet.
>>> I think the other view is that all/most/many hosts should be protected by
>>> a stateful firewall.
>>> 
>>> I don¹t know that we can resolve this tension in v6ops, but I want to make
>>> it explicit.
>> 
>> Well, we’ve seen a few firewall models put forward in v6ops. RFC 6092 seems
>> to have been generally well received. It may well be the only one that made it
>> to RFC status? e.g. draft-ietf-v6ops-balanced-ipv6-security-01 stopped at that
>> version.
> 
> That is explicitly why Fernando and I are trying to have a firewall discussion in opsawg (draft-gont-opsawg-firewalls-analysis). RFC 6092 is certainly a common firewall model (modeling a NAT's behavior), but I would say that the consensus supporting it was "rough". The other firewall models proposed (draft-ietf-v6ops-balanced-ipv6-security, draft-vyncke-advanced-ipv6-security) basically pushed towards firewall-as-a-service, and as such gutted the filter function.
> 
> I'll refer us to that discussion if we want to go general on firewall functionality.
> 
> My question here was essentially about finding a simple rule *on*the*host* that might obviate a lot of attacks and probing. The conclusion that I draw is that I can do anything I want as long as I don't change anything, and yes, my suggestion is a change. I actually do think there may be value in it, however.

I agree. And to me that seems fine - how the host handles the address(es) it uses to initiate or receive traffic is a matter for it, just as host-based filtering / access control is.

Tim