Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop

"Templin, Fred L" <Fred.L.Templin@boeing.com> Tue, 16 October 2012 19:36 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 821C31F0C60 for <v6ops@ietfa.amsl.com>; Tue, 16 Oct 2012 12:36:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.468
X-Spam-Level:
X-Spam-Status: No, score=-2.468 tagged_above=-999 required=5 tests=[AWL=0.131, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wlo1twyqD9So for <v6ops@ietfa.amsl.com>; Tue, 16 Oct 2012 12:36:36 -0700 (PDT)
Received: from blv-mbsout-02.boeing.com (blv-mbsout-02.boeing.com [130.76.32.232]) by ietfa.amsl.com (Postfix) with ESMTP id A59E61F0C3A for <v6ops@ietf.org>; Tue, 16 Oct 2012 12:36:36 -0700 (PDT)
Received: from blv-mbsout-02.boeing.com (localhost.localdomain [127.0.0.1]) by blv-mbsout-02.boeing.com (8.14.4/8.14.4/DOWNSTREAM_MBSOUT) with ESMTP id q9GJaaYY001001 for <v6ops@ietf.org>; Tue, 16 Oct 2012 12:36:36 -0700
Received: from XCH-NWHT-05.nw.nos.boeing.com (xch-nwht-05.nw.nos.boeing.com [130.247.25.109]) by blv-mbsout-02.boeing.com (8.14.4/8.14.4/UPSTREAM_MBSOUT) with ESMTP id q9GJaZ1f000464 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=OK); Tue, 16 Oct 2012 12:36:35 -0700
Received: from XCH-NW-01V.nw.nos.boeing.com ([130.247.64.120]) by XCH-NWHT-05.nw.nos.boeing.com ([130.247.25.109]) with mapi; Tue, 16 Oct 2012 12:36:35 -0700
From: "Templin, Fred L" <Fred.L.Templin@boeing.com>
To: David Farmer <farmer@umn.edu>
Date: Tue, 16 Oct 2012 12:36:34 -0700
Thread-Topic: [v6ops] new draft: draft-taylor-v6ops-fragdrop
Thread-Index: Ac2r07zQ8CWm63CPTU2of9nTwN83nQAAYunA
Message-ID: <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF41E@XCH-NW-01V.nw.nos.boeing.com>
References: <201210161245.q9GCj0i26478@ftpeng-update.cisco.com> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3A2@XCH-NW-01V.nw.nos.boeing.com> <507DA6A3.20807@inex.ie> <E1829B60731D1740BB7A0626B4FAF0A65E0DEDF3C3@XCH-NW-01V.nw.nos.boeing.com> <507DB421.8060707@umn.edu>
In-Reply-To: <507DB421.8060707@umn.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-TM-AS-MML: No
Cc: "v6ops@ietf.org" <v6ops@ietf.org>, "draft-taylor-v6ops-fragdrop@tools.ietf.org" <draft-taylor-v6ops-fragdrop@tools.ietf.org>
Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Oct 2012 19:36:37 -0000

> -----Original Message-----
> From: David Farmer [mailto:farmer@umn.edu]
> Sent: Tuesday, October 16, 2012 12:23 PM
> To: Templin, Fred L
> Cc: Nick Hilliard; v6ops@ietf.org; draft-taylor-v6ops-
> fragdrop@tools.ietf.org; David Farmer
> Subject: Re: [v6ops] new draft: draft-taylor-v6ops-fragdrop
> 
> 
> On 10/16/12 13:42 CDT, Templin, Fred L wrote:
> >
> > Why not just let non-initial fragments through and then forward
> > or don't forward the initial fragment depending on whether it
> > contains enough information in tlv headers to permit a filtering
> > decision?
> >
> 
> There are fundamental differences in the security threat models between
> a bank and a prison.
> 
> If what you are trying to do is prevent information leakage, things
> getting out, then the non-initial fragments could have valuable
> information that you don't want leaking, even if it is incomplete
> information.

Data exfiltration by an adversary at work within your own network?
Sounds like a good use case for Virtual Fragmentation Reassembly.

Thanks - Fred
fred.l.templin@boeing.com

> Yes, encryption can deal with this issue, but were dealing with the same
> mentality that says you have to decrypt everything crossing the
> parameter to inspect everything going out or coming in.
> 
> In most situations I believe this is invalid reasoning, however I cannot
> say it is invalid in all situations.  I also believe the reasoning is in
> far more common use than the situations that actually justify it.
> 
> --
> ===============================================
> David Farmer               Email:farmer@umn.edu
> Office of Information Technology
> University of Minnesota
> 2218 University Ave SE	    Phone: 612-626-0815
> Minneapolis, MN 55414-3029   Cell: 612-812-9952
> ===============================================