Re: I-D.ietf-v6ops-cpe-simple-security-09

Mark Townsley <townsley@cisco.com> Sun, 21 March 2010 21:27 UTC

Return-Path: <owner-v6ops@ops.ietf.org>
X-Original-To: ietfarch-v6ops-archive@core3.amsl.com
Delivered-To: ietfarch-v6ops-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 329723A6939 for <ietfarch-v6ops-archive@core3.amsl.com>; Sun, 21 Mar 2010 14:27:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.621
X-Spam-Level:
X-Spam-Status: No, score=-7.621 tagged_above=-999 required=5 tests=[AWL=-0.256, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_HI=-8, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eRde6IbmUGOt for <ietfarch-v6ops-archive@core3.amsl.com>; Sun, 21 Mar 2010 14:27:35 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 783A43A6817 for <v6ops-archive@lists.ietf.org>; Sun, 21 Mar 2010 14:27:35 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.71 (FreeBSD)) (envelope-from <owner-v6ops@ops.ietf.org>) id 1NtSeO-000Nqx-Q2 for v6ops-data0@psg.com; Sun, 21 Mar 2010 21:25:36 +0000
Received: from [171.68.10.86] (helo=sj-iport-4.cisco.com) by psg.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.71 (FreeBSD)) (envelope-from <townsley@cisco.com>) id 1NtSeK-000NqD-EI for v6ops@ops.ietf.org; Sun, 21 Mar 2010 21:25:32 +0000
Authentication-Results: sj-iport-4.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAFkrpkurR7H+/2dsb2JhbACbOnOgNpdihH0E
X-IronPort-AV: E=Sophos;i="4.51,284,1267401600"; d="scan'208";a="103591635"
Received: from sj-core-2.cisco.com ([171.71.177.254]) by sj-iport-4.cisco.com with ESMTP; 21 Mar 2010 21:25:31 +0000
Received: from iwan-view3.cisco.com (iwan-view3.cisco.com [171.70.65.13]) by sj-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id o2LLPVJ6017124; Sun, 21 Mar 2010 21:25:31 GMT
Received: from ams-townsley-8719.cisco.com (ams-townsley-8719.cisco.com [10.55.233.234]) by iwan-view3.cisco.com (8.11.2/CISCO.WS.1.2) with ESMTP id o2LLPUY11712; Sun, 21 Mar 2010 14:25:30 -0700 (PDT)
Message-ID: <4BA68EC9.8050506@cisco.com>
Date: Sun, 21 Mar 2010 22:25:29 +0100
From: Mark Townsley <townsley@cisco.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.1.8) Gecko/20100227 Thunderbird/3.0.3
MIME-Version: 1.0
To: Mark Smith <ipng@69706e6720323030352d30312d31340a.nosense.org>
CC: james woodyatt <jhw@apple.com>, IPv6 Operations <v6ops@ops.ietf.org>
Subject: Re: I-D.ietf-v6ops-cpe-simple-security-09
References: <D6F5ACD2-EB43-477E-9F48-AC3EDB3F7EB4@apple.com> <4BA3BBCF.2090903@cisco.com> <4BA3D1B3.4010501@gmail.com> <9EEBEB1D-8D88-45DB-9200-EBE2ED0D84CF@apple.com> <4BA524A8.9020201@cisco.com> <D6BE2A3C-57BD-486D-B9C6-382B42FA4A67@cisco.com> <4BA55147.601@cisco.com> <F0FDFF3D-F703-422A-9443-D6F723FB034C@cisco.com> <20100321113037.13756c12@opy.nosense.org> <E8126B81-8893-4BE4-85AF-AA51EC7A4101@apple.com> <20100321183807.76a4e2c8@opy.nosense.org>
In-Reply-To: <20100321183807.76a4e2c8@opy.nosense.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-v6ops@ops.ietf.org
Precedence: bulk
List-ID: <v6ops.ops.ietf.org>

On 3/21/10 9:08 AM, Mark Smith wrote:
> Hi James,
>
> On Sat, 20 Mar 2010 23:00:40 -0700
> james woodyatt<jhw@apple.com>  wrote:
>
>    
>> On Mar 20, 2010, at 18:00, Mark Smith wrote:
>>      
>>> One thing that does seem to be missing from the draft is a specific list of threats it is attempting to mitigate i.e. a threat model.
>>>        
>> RFC 4864 doesn't offer one, and its authors haven't offered much in the way of specifics to the discussion here or on the design team list.  Perhaps, you'd like to offer a contribution?
>>
>>      
> While threat model is probably the correct term, more broadly I think
> probably something of a problem statement i.e. what security measures
> the CPE does provide, and what it doesn't, probably with some
> justification.
>
> I think the role of IPv6 CPE in the residential Internet security model
> is different to the role IPv4/NAT CPE commonly is or was capable of
> playing.
>
> Stating the obvious, IPv4/NAT provides a much harder boundary between
> internal and external devices, primarily due to the nature of NAPT.
> NAPT by it's nature provides a default deny to inbound traffic. That's
> what breaks end-to-end. Because of that harder boundary, I think
> end-user expectations are that the IPv4/NAPT CPE can perform much
> more of a primary security role when it comes to protecting them from
> the Internet.
>
> The nature of the operation of NAPT inherently defined a set of threats
> that it protected against.
>
> With IPv6/CPE security, by trying to restore end-to-end, I think we're
> inherently reducing the security that people formerly had with
> IPv4/NAPT CPE. End nodes will now have to play more of a primary
> security role, with filtering IPv6/CPE providing an
> assisting/secondary/defence in depth role.
>    
Which that vast majority of IPv6-enabled devices already do.

- Mark
> Now that IPv6 end-nodes will be "burdened" with more security
> responsibility, I think it is important to make sure it is clear that
> the security functions performed in IPv6 CPE aren't exactly the
> same as as they were in IPv4/NAPT CPE.
>    





>
>    
>> The Overview contains my best attempt at explaining what considerations I think are really in play behind the CPE Simple Security recommendation.  Here's what I think is the most relevant excerpt:
>>
>>      
>>>> The stateful packet filtering behavior of NAT set user expectations that persist today with residential IPv6 service.  "Local Network Protection for IPv6" [RFC4864] recommends applying stateful packet filtering at residential IPv6 gateways that conforms to the user expectations already in place.
>>>>          
>> In other words, we recommend filtering at the middlebox-- making IPv6 routers do filtering like IPv4/NAT gateways do-- because "defense in depth" is a virtue in and of itself, and that Internet users have come to expect it.  Apparently, there's a consensus in IETF that this is enough reason to do it, and I strongly suspect that an explicit threat model might be inviting more controversy than anyone wants to endure.
>>
>>
>>      
> Regards,
> Mark.
>
>
>