Re: [v6ops] [OPSEC] Asking for a review of draft-ietf-opsec-v6-08

Mark Smith <markzzzsmith@gmail.com> Thu, 16 June 2016 12:17 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C10112D548; Thu, 16 Jun 2016 05:17:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.197
X-Spam-Level:
X-Spam-Status: No, score=-2.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0d_DqhM6zb_k; Thu, 16 Jun 2016 05:17:15 -0700 (PDT)
Received: from mail-vk0-x22e.google.com (mail-vk0-x22e.google.com [IPv6:2607:f8b0:400c:c05::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B97A312D531; Thu, 16 Jun 2016 05:17:14 -0700 (PDT)
Received: by mail-vk0-x22e.google.com with SMTP id t129so70462874vka.1; Thu, 16 Jun 2016 05:17:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=xZS+hGdxvpzHlQnPCCLqNskU6BuvGXtijoyNDQ0+L88=; b=boQ9IHQ5JFCMSHczZUqmGXQCmIjGd8fk5Y3JyU/6aBM/tQ0CAcl99O5T/P4OjHxX05 WzBSctO7o9LV/suP/f64QnoBRuyMof7QJwQuEtiW0d+eMYYC4VBPZBn60NwCY9VAZZxC Hm4ouDxTmHoZZ6+d969E7pI9vr1srEx9PbSKh4TNt3v1RjplZNtMcfmNltN3JBOY1XN9 IIaIolunaNCqJ0O/wUFWXch/VSWeus+IlCkSKeCMXSMHDc4uSz2AXqRKPsvfDd8ExO9W a32u4YTZSXaRD5scRHWhc3r2suBVw7tLzwxVYZgE0rx8AUURzk734y87XM7xfzpVWuXM GOtg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=xZS+hGdxvpzHlQnPCCLqNskU6BuvGXtijoyNDQ0+L88=; b=ha1e5b3y+gLwlsYMCHhYFE+uU020yfuoIYu74Pc9h06EJ6AGqMRxqQIyJUJxyIqPgn 8QVYVUikTPbsTqZq5YdHfFIJMeWB1yOJTff6RmEdtpe7g+ADbvwT2Gpu1zo2Xplg697k 0KuDRiT7+la4AZLIe+BDGxi1z4lrcwH+chZH9WXjnrMOJpCzFJlWeKEStKWS4a0TyxcH WK3TbFJdlNhLOq92KHqj1HQArU5Ut6LiYgtpQig3vc8B//RiiU2Y0Om3mY3wTI+Utxj9 7mK6xFk+iSPERt43l3zysAw2A3cdYALsTtQii1kB9Q2Y9W3F7SSreXoiztmdacok+iiA P1Kw==
X-Gm-Message-State: ALyK8tKCU2DY2ywN6k2m2EDfNvWeW+RjPYRFD/V3+SVJ9+7xd3C6YmIFv7XnJ0fPRoXxavQjFoS/1CIZZy77lQ==
MIME-Version: 1.0
X-Received: by 10.176.69.141 with SMTP id u13mr2029550uau.133.1466079433559; Thu, 16 Jun 2016 05:17:13 -0700 (PDT)
Received: by 10.176.65.198 with HTTP; Thu, 16 Jun 2016 05:17:13 -0700 (PDT)
Received: by 10.176.65.198 with HTTP; Thu, 16 Jun 2016 05:17:13 -0700 (PDT)
In-Reply-To: <CAO42Z2yqb34E3j3ZFqJLZr3P72-yjsurMgmvKovLy2p=sxFKDQ@mail.gmail.com>
References: <D386FF93.75916%evyncke@cisco.com> <CAAedzxqBr=ApvGTUrjNUnRmpcamkt4OH1CchcDEWgDcXRgo8Fw@mail.gmail.com> <173d2c6b-4cbf-88da-cf20-710a90e04c7e@gmail.com> <38465846B6383D4A8688C0A13971900C48DBF82F@ge2eml2k1004> <CAO42Z2z_pgBrn3bNRagx4W2FYn4aJ=NYNGwzDk+Q2o373qux+A@mail.gmail.com> <38465846B6383D4A8688C0A13971900C48DBFD81@ge2eml2k1004> <CAO42Z2yqb34E3j3ZFqJLZr3P72-yjsurMgmvKovLy2p=sxFKDQ@mail.gmail.com>
Date: Thu, 16 Jun 2016 22:17:13 +1000
Message-ID: <CAO42Z2ywK_KR+e4nqu-Jbr3xj5KQG7=aKrgpceN5tooQCQSvDg@mail.gmail.com>
From: Mark Smith <markzzzsmith@gmail.com>
To: Marco Ermini <Marco.Ermini@resmed.com>
Content-Type: multipart/alternative; boundary="94eb2c0cbf7ad9947e0535643725"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/7YfDDsmDN2hRMGmM2XYWFfkIvks>
Cc: "v6ops@ietf.org" <v6ops@ietf.org>, draft-ietf-opsec-v6@ietf.org, "opsec@ietf.org" <opsec@ietf.org>, "linkedin@xn--debrn-nva.de" <linkedin@xn--debrn-nva.de>, "fgont@si6networks.com" <fgont@si6networks.com>
Subject: Re: [v6ops] [OPSEC] Asking for a review of draft-ietf-opsec-v6-08
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jun 2016 12:17:17 -0000

On 16 Jun 2016 20:03, "Marco Ermini" <Marco.Ermini@resmed.com> wrote:
>
> Hi,
>
> NAT can be still necessary in IPv6 in dual-stack scenario, for instance,
where every host is assigned both a IPv4 and IPv6 addresses and the CGN
equipment can't handle them differently.

Can you provide an example of this sort of CGN device.

IPv4 and IPv6 have to be handled differently because they're different
protocols, requiring different code. A single device might be performing
NAT on IPv4 traffic it receives and doing standard stateless forwarding of
IPv6 traffic. Is that the scenario you're describing?

I'd struggle to believe that there are CGN devices where performing NAT on
IPv6 traffic is mandatory if IPv4 NAT is being performed.

Unfortunately RFC 4864 does not mention such case, AFAIK.
>
> In any case, I am happy to concede it could be an extreme case and that
it is not necessary anymore in IPv6 for the great majority of use cases.
>
> I was not really making a specific case for IPv6 - my opposition was to
the concept that NAT is not security, and to the fact that it should be
written as such in the RFC.

So this draft is purely about IPv6. There will be a lot of IPv4 security
measures that can be applied to IPv6, however there will also be others
that shouldn't, and opportunities where IPv6 can provide better security
that IPv4 (e.g. sparse host addressing in a /64 makes address probing to
discover hosts impossible within a useful and practical timeframe.).

 > NAT *does* provide a form of security

What specific security does it provide that is due to the address
translation function?

If you're thinking about the protection provided due to the state being
created during the address translation process, that state can be created
without performing address translation, which is what a stateful firewall
does and did in IPv4 before NAT became widely deployed.

> - the fact that it is not desirable or it is unnecessary to use is
another topic, in which I believe we all agree (at least for 99% of use
cases ;-))
>

I don't see a need to deploy NAT with IPv6 as what has been achieved with
IPv4 NAT can be achieved in IPv6 without the drawbacks of NAT.

Regards,
Mark.

>
> Regards,
> ​​​​​
> Marco Ermini
>
> CISSP, CISA, CISM, CEH, ITIL, MCP, PhD
> Senior IT Security Analyst
> D +49 (0)899 901 1523  M +49 (0)175 439 5642
>
> ResMed Germany Inc
>
>
>
> -----Original Message-----
> From: Mark Smith [mailto:markzzzsmith@gmail.com]
> Sent: Thursday, June 16, 2016 11:43 AM
> To: Marco Ermini
> Cc: Brian E Carpenter; Erik Kline; Eric Vyncke (evyncke);
fgont@si6networks.com; opsec@ietf.org; draft-ietf-opsec-v6@ietf.org;
linkedin@xn--debrn-nva.de; v6ops@ietf.org
> Subject: Re: [v6ops] [OPSEC] Asking for a review of draft-ietf-opsec-v6-08
>
> On 16 June 2016 at 19:15, Marco Ermini <Marco.Ermini@resmed.com> wrote:
> > Well, actually, infrastructure hiding IS part of security.  It is not
the full picture, but it is incorrect to say that it is not.
> >
> > I personally don't sympathize on NAT-haters.  NAT has its reasons,
> > especially for carrier-grade NAT
>
> CGN isn't necessary in IPv6, it's to solve the problem of ISPs running
out of IPv4 addresses.
>
>  and especially in the telco scenario, and yes, it does provide some
level of security - again, not the complete picture, but it does.
> >
>
> NAT is not necessary in IPv6. The equivalent of NAT's perceived security
can be provided via alternative methods, as described in RFC4864.
>
> A further technique to hide topology that isn't mentioned in RFC4864 is
to use something like ISATAP or similar, to create a single /64 subnet over
the top of multiple IPv4 subnets. Externally, all hosts will appear to
belong to a single IPv6 subnet, hiding the internal topology.
>
> If you truly want to hide the identities of hosts, NAT doesn't do enough
- it is only translating addresses, where as there are many other host
identifiers that the host itself supplies or will receive and supply that
can identify hosts e.g. HTTP cookies. "A Technique for Counting NATted
Hosts"
> (https://www.cs.columbia.edu/~smb/papers/fnat.pdf) showed how a field
within the IPv4 header that leaked across a NAT was able to be used to
identify hosts.
>
> If you truly want to hide a host from the Internet, yet still allow it to
access things on the Internet, under IPv6 your network would use ULA
addressing, and have a per-application protocol proxy server that makes all
requests look like they've entirely originated from the application proxy
server itself. To the Internet server, the application proxy server would
appear to be the application end host making the requests, preventing any
internal host identifiers or other attributes from leaking.
>
>
> Regards,
> Mark.
>
>
> >
> > Regards,
> >
> > Marco Ermini
> >
> > CISSP, CISA, CISM, CEH, ITIL, MCP, PhD Senior IT Security Analyst D
> > +49 (0)899 901 1523  M +49 (0)175 439 5642
> >
> > ResMed Germany Inc
> >
> >
> > -----Original Message-----
> > From: OPSEC [mailto:opsec-bounces@ietf.org] On Behalf Of Brian E
> > Carpenter
> > Sent: Thursday, June 16, 2016 1:45 AM
> > To: Erik Kline; Eric Vyncke (evyncke)
> > Cc: fgont@si6networks.com; opsec@ietf.org; linkedin@xn--debrn-nva.de;
> > draft-ietf-opsec-v6@ietf.org; v6ops@ietf.org
> > Subject: Re: [OPSEC] [v6ops] Asking for a review of
> > draft-ietf-opsec-v6-08
> >
> > On 16/06/2016 07:45, Erik Kline wrote:
> >> Section 2.1.2 is far too permissive for my tastes.  We need to be
> >> able to say that ULA+IPv6 NAT is NOT RECOMMENDED by the IETF.
> >
> > I have strong sympathy with that statement, but I don't think this is
the document to do it; the point is made in RFC4864 too. What we should do
here is underline that NAT != security.
> >
> > While I'm here, some other points:
> >
> > "2.2.  Extension Headers
> >
> >    TBD, a short section referring to all Fernando's I-D & RFC."
> >
> > That's not the whole story ;-). Firstly, RFC 7045 has a lot of
> > relevance to security aspects. Second, there is no reason to refer to
> > most of the material (Fernando's or not) unless it's directly relevant
> > to opsec. I think the reference is draft-ietf-opsec-ipv6-eh-filtering,
> > but only if that document is going anywhere.
> >
> > "2.3.3.  ND/RA Rate Limiting
> > ...
> >    The following drafts are actively discussing methods to
> >    rate limit RAs and other ND messages on wifi networks in order to
> >    address this issue:
> >
> >    o  [I-D.thubert-savi-ra-throttler]
> >
> >    o  [I-D.chakrabarti-nordmark-6man-efficient-nd]"
> >
> > Neither of those drafts is in the least active (from 2012 and 2015
respectively). Dead drafts are of no help to the reader, IMHO.
> >
> > "4.2.  Transition Mechanism
> >
> >    SP will typically use transition mechanisms such as 6rd, 6PE, MAP,
> >    DS-Lite which have been analyzed in the transition Section 2.7.2
> >    section."
> >
> > Shouldn't you add RFC6877 464XLAT now?
> >
> > Finally, I think there should be a Privacy Considerations section.
> >
> > Rgds
> >     Brian
> >
> >>
> >> Section 2.6.1.5 could punch up the SAVI stuff a bit more as well.  We
> >> should, in my opinion, make it painfully clear that DHCP (of any
> >> protocol) in the absence of link-layer security/auditability features
> >> does not provide any satisfactory way "to ensure audibility and
> >> traceability" [Section 2.1.6].
> >>
> >> _______________________________________________
> >> v6ops mailing list
> >> v6ops@ietf.org
> >> https://www.ietf.org/mailman/listinfo/v6ops
> >>
> >
> > _______________________________________________
> > OPSEC mailing list
> > OPSEC@ietf.org
> > https://www.ietf.org/mailman/listinfo/opsec
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://www.ietf.org/mailman/listinfo/v6ops