Re: [v6ops] [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)

Fernando Gont <fgont@si6networks.com> Thu, 18 May 2023 13:10 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2069C151068; Thu, 18 May 2023 06:10:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fmu9OpmUuD7K; Thu, 18 May 2023 06:10:42 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 001FAC151065; Thu, 18 May 2023 06:10:41 -0700 (PDT)
Received: from [172.19.0.3] (149.104.176.34.bc.googleusercontent.com [34.176.104.149]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id DB5F32804B3; Thu, 18 May 2023 10:10:34 -0300 (-03)
Message-ID: <45979491-9fcc-7a1c-5b11-88acf91d765f@si6networks.com>
Date: Thu, 18 May 2023 15:10:29 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.10.0
Content-Language: en-US
To: Tom Herbert <tom@herbertland.com>
Cc: 6man@ietf.org, V6 Ops List <v6ops@ietf.org>, opsec WG <opsec@ietf.org>
References: <11087a11-476c-5fb8-2ede-e1b3b6e95e48@si6networks.com> <CALx6S343f_FPXVxuZuXB4j=nY-SuTEYrnxb3O5OQ3fv5uPwT8g@mail.gmail.com>
From: Fernando Gont <fgont@si6networks.com>
Organization: SI6 Networks
In-Reply-To: <CALx6S343f_FPXVxuZuXB4j=nY-SuTEYrnxb3O5OQ3fv5uPwT8g@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/Vf6_5_Syo9lgcq8jxnGRz2LTWOI>
Subject: Re: [v6ops] [IPv6] Why folks are blocking IPv6 extension headers? (Episode 1000 and counting) (Linux DoS)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 May 2023 13:10:44 -0000

HI, Tom,

On 17/5/23 19:56, Tom Herbert wrote:

> 
> Fernando,
> 
> There's an old saying phrased in the form of a question: "What is the
> most secure network in the world?". The answer is "One that's turned
> off". 

It is not about "most secure network", but rather about unnecessary risk.

Go look the CVEs for IPv6 EHs. Then go enable them in your network, and 
when you get DoSed, you tell your manager that while thr feature wasn't 
needed, and you were aware about the long track of CVEs associated with 
the feature, you leave it if enabled "for the good of the Internet".

That line of thought would have never thought with anybody I have worked 
for in a security role.


> So, if you want to build a network with maximum security then by all
> means drop packets with extension headers; but, also be sure to drop
> packets containing other protocols that are potentially susceptible to
> implementation which includes any other transport protocol other than
> TCP, IP fragmentation, and you probably should consider IPv6 as well
> since we certainly haven't seen the last of the implementation bugs
> for that. UDP as a secure protocol is right out! For the remaining
> "authorized" protocols, which is just TCP over IPv4, immediately drop
> all TCP packets that are not to or from port 443 because anything else
> is insecure. Also a TCP implementation could have bugs, so require
> that users only use a network provider approved TCP stack
> implementation verified to be bug free and frozen in time that only
> allows bug fixes (we need to avoid regressions!).

There's 20/30+ additional years of experience and tests of IPv4 and TCP 
implementations than with these IPv6 features.

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: F242 FF0E A804 AF81 EB10 2F07 7CA1 321D 663B B494