Re: [v6ops] draft-ietf-v6ops-enterprise-incremental-ipv6 WGLC

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Tue, 13 August 2013 14:37 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E3A021E8119 for <v6ops@ietfa.amsl.com>; Tue, 13 Aug 2013 07:37:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.999
X-Spam-Level:
X-Spam-Status: No, score=-9.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZNz1Cd8Kh6wW for <v6ops@ietfa.amsl.com>; Tue, 13 Aug 2013 07:37:05 -0700 (PDT)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) by ietfa.amsl.com (Postfix) with ESMTP id 7789E11E816D for <v6ops@ietf.org>; Tue, 13 Aug 2013 07:37:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6839; q=dns/txt; s=iport; t=1376404625; x=1377614225; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=IeiLOoLW8oRQKW3tUSG7owqAVZJNowWdwbpdk/EtAvo=; b=lM7jtI3fcnUpWjOHKicchF1GZhmdB05tzDpH1/2s2iSAEb0fFPPlZRPw 6wRC/b6eX8LNcvvGu2WOy/P6ZCKVRNYY0PXI/+6TzOYBfQUrUXCMU5B24 cfL9K6iEq7XbMl8NyLwEpIhmAXhf/zmDG0E+bieBOrXUh/uyHxJL1MEy1 M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AhIFAOFDClKtJV2b/2dsb2JhbABbgwY1UL5bgSAWdIIkAQEBBAEBAWUGCwwEAgEIEQQBAQEKHQchBgsUAwEFCAIEAQ0FCBOHYwMPDK8SDYhaBI1FgkYsBQcGgxV2A4h1jQaOE4UngxuCKg
X-IronPort-AV: E=Sophos;i="4.89,869,1367971200"; d="scan'208";a="246742569"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-7.cisco.com with ESMTP; 13 Aug 2013 14:37:04 +0000
Received: from xhc-aln-x10.cisco.com (xhc-aln-x10.cisco.com [173.36.12.84]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id r7DEb4N8016101 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 13 Aug 2013 14:37:04 GMT
Received: from xmb-aln-x02.cisco.com ([169.254.5.110]) by xhc-aln-x10.cisco.com ([173.36.12.84]) with mapi id 14.02.0318.004; Tue, 13 Aug 2013 09:37:04 -0500
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>, Brian E Carpenter <brian.e.carpenter@gmail.com>, "Arie Vayner (avayner)" <avayner@cisco.com>
Thread-Topic: [v6ops] draft-ietf-v6ops-enterprise-incremental-ipv6 WGLC
Thread-Index: AQHOl5rYDMSxdUYJukeaGavK35KXPJmS5vgAgABOd3A=
Date: Tue, 13 Aug 2013 14:37:03 +0000
Message-ID: <97EB7536A2B2C549846804BBF3FD47E113130861@xmb-aln-x02.cisco.com>
References: <201308041800.r74I03pC023049@irp-view13.cisco.com> <3374_1375690984_51FF60E8_3374_427_1_983A1D8DA0DA5F4EB747BF34CBEE5CD15C5041E1E5@PUEXCB1C.nanterre.francetelecom.fr> <8C48B86A895913448548E6D15DA7553B96E2C5@xmb-rcd-x09.cisco.com> <CAKD1Yr13GK_cuvkt2LpJ1qJo2NR8eUnY-xfwMF_zWfe0P1mm9g@mail.gmail.com> <8C48B86A895913448548E6D15DA7553B96EAE7@xmb-rcd-x09.cisco.com> <CAKD1Yr2_d=4uD1W4WcQ82rupjVJ4UmmQAQmtSY+aQgTXmscNUw@mail.gmail.com> <97EB7536A2B2C549846804BBF3FD47E113128FA2@xmb-aln-x02.cisco.com> <CA6D42D0F8A41948AEB3864480C554F104AE7A3F@xmb-rcd-x10.cisco.com> <C00B4018-6FEE-441C-B807-B1126101CE6D@delong.com> <CA6D42D0F8A41948AEB3864480C554F104AEAABE@xmb-rcd-x10.cisco.com> <520945FF.4000700@gmail.com> <1376369664.37168.YahooMailNeo@web142504.mail.bf1.yahoo.com>
In-Reply-To: <1376369664.37168.YahooMailNeo@web142504.mail.bf1.yahoo.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.55.185.71]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "v6ops@ietf.org" <v6ops@ietf.org>
Subject: Re: [v6ops] draft-ietf-v6ops-enterprise-incremental-ipv6 WGLC
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Aug 2013 14:37:10 -0000

While I agree with you about laptops & desktops, I am less sure about IoT and all IP webcam, Rasp PI and all other thermostats... but this is indeed the direction and this should be the underlying idea

OTOH, large enterprises do not want only to secure their employees' desktop, they also want to enforce a security policy... (data leakage, ...) where the end point cannot be also be trusted ;-)

> -----Original Message-----
> From: v6ops-bounces@ietf.org [mailto:v6ops-bounces@ietf.org] On Behalf Of
> Mark ZZZ Smith
> Sent: mardi 13 août 2013 06:54
> To: Brian E Carpenter; Arie Vayner (avayner)
> Cc: v6ops@ietf.org
> Subject: Re: [v6ops] draft-ietf-v6ops-enterprise-incremental-ipv6 WGLC
> 
> 
> 
> 
> 
> ----- Original Message -----
> > From: Brian E Carpenter <brian.e.carpenter@gmail.com>
> > To: Arie Vayner (avayner) <avayner@cisco.com>
> > Cc: "v6ops@ietf.org" <v6ops@ietf.org>
> > Sent: Tuesday, 13 August 2013 6:30 AM
> > Subject: Re: [v6ops] draft-ietf-v6ops-enterprise-incremental-ipv6 WGLC
> >
> > On 12/08/2013 17:27, Arie Vayner (avayner) wrote:
> >>  Owen,
> >>
> >>  While the arguments about moving the firewalls closer to the users
> >> are
> > valid they are often are not practical (or at least the customers I
> > worked with would not implement this option).
> >>  Imagine an enterprise network with 300 spoke sites, but only 2 or 3
> > Internet gateway locations (with some private WAN in between).
> >>  Moving the firewalls to the spoke sites would increase the number of
> > firewalls from ~3 to ~300 (I am ignoring redundancy and scale for a
> second)...
> > This is a major CAPEX and OPEX impact...
> >
> > Clearly DOS and scanning protection has to be done as close to the
> > Internet border routers as possible, and there your logic applies.
> >
> > However, as Steve Bellovin pointed out many years ago, the best number
> > of firewalls for upper layer protection is one per host, which scales
> > nicely and has less CAPEX and OPEX than middlebox firewalls will ever
> have.
> >
> 
> Host based firewalling by default has also pretty much been reality for
> most devices for the last 5+ years, if not much longer (Windows XP Service
> Pack 2 provided and enabled by default a host firewall in around 2004). I
> think the reality today is that vendors assume that if a device could be
> plugged directly into the Internet it probably will be, and therefore they
> provide and enable host based firewalls by default.
> 
> It seems common for the people who make the above argument to be the same
> people who are facilitating direct attachment of hosts to untrusted and
> uncontrolled networks by providing laptops instead of desktops, organising
> 3G/4G dongles for those laptops, and allowing rather than prohibiting
> people from taking those laptops home, to conferences, cafes and hotels.
> Fortunately their OS vendors have taken care of enabling host protection
> on their behalf.
> 
> > Not that I see any of this argument as relevant to the IP version
> number.
> >
> 
> Agree.
> 
> >    Brian
> >
> >>  Arie
> >>
> >>  From: Owen DeLong [mailto:owen@delong.com]
> >>  Sent: Friday, August 9, 2013 12:17 PM
> >>  To: Arie Vayner (avayner)
> >>  Cc: Eric Vyncke (evyncke); Lorenzo Colitti; Fred Baker (fred);
> > v6ops@ietf.org
> >>  Subject: Re: [v6ops] draft-ietf-v6ops-enterprise-incremental-ipv6
> >> WGLC
> >>
> >>
> >>  On Aug 8, 2013, at 22:21 , Arie Vayner (avayner)
> > <avayner@cisco.com<mailto:avayner@cisco.com>> wrote:
> >>
> >>
> >>  Another loosely related point that I think could make sense in such
> >> a
> > document would be the ways to accomplish multi-homing and how it is
> > different than today's IPv4 implementations.
> >>
> >>  Many enterprises rely on NAT on the Internet edge as their
> > multi-homing/traffic engineering mechanism with IPv4.
> >>
> >>  If we recommend against ULA+NPTv6 (or just NPTv6 for traffic
> >> engineering),
> > then we need to highlight the symmetry requirement due to stateful
> > security layers.
> >>  Traffic leaving from an Internet gateway site to the Internet has to
> >> come
> > back through the same site, or the stateful firewalls would break the
> > flow (well, has to hit the same stateful security layer)
> >>
> >>  Or stateful firewalls have to get better about sharing state. There
> >> are two
> > things that can help with this...
> >>
> >>  1.         Put your firewalls as close to the end systems they
> >> protect as
> > possible. Make your security zones relatively small and place the
> > firewalls closer together at those narrower borders.
> >>              This will often require more firewall units, but it
> >> helps in a
> > number of ways:
> >>              A.        Firewall policy tends to be much simpler (and
> >> as a
> > result less error prone and more reliable)
> >>              B.        The hardware demands on the firewall tend to
> >> be lower
> > so you can buy cheaper units.
> >>              C.        The simpler rulesets can be more easily
> >> tailored to
> > meet business requirements as they evolve.
> >>
> >>
> >>
> >>  2.         Improve firewalls. Give the firewalls that all protect
> >> the same
> > boundary a way to mesh-peer with each other and exchange information
> > about the state tables such that triangle routing is no longer
> problematic.
> >>
> >>
> >>  Syncing upstream and downstream routing policies is not always an
> >> easy task
> > (but could be relevant in some cases).
> >>  Linking the Internet gateway layer across sites (before hitting the
> > stateful security layer) could be another solution.
> >>
> >>  If we make the changes above to the firewalls, this could be  a lot
> >> less
> > relevant in most cases.
> >>
> >>
> >>  Do you think a short discussion to raise awareness for this
> >> potential issue
> > could be relevant in such a document?
> >>
> >>  It's certainly worth documenting. I'm not sure whether it belongs
> > in this document or not.
> >>
> >>  Owen
> >>
> >>
> >>
> >>
> >>
> >>
> >> ---------------------------------------------------------------------
> >> ---
> >>
> >>  _______________________________________________
> >>  v6ops mailing list
> >>  v6ops@ietf.org
> >>  https://www.ietf.org/mailman/listinfo/v6ops
> > _______________________________________________
> > v6ops mailing list
> > v6ops@ietf.org
> > https://www.ietf.org/mailman/listinfo/v6ops
> >
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops