Re: Some suggestions for draft-ietf-v6ops-cpe-simple-security-03

james woodyatt <jhw@apple.com> Wed, 27 August 2008 19:10 UTC

Return-Path: <owner-v6ops@ops.ietf.org>
X-Original-To: ietfarch-v6ops-archive@core3.amsl.com
Delivered-To: ietfarch-v6ops-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0F98D3A6C4D for <ietfarch-v6ops-archive@core3.amsl.com>; Wed, 27 Aug 2008 12:10:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.495
X-Spam-Level:
X-Spam-Status: No, score=-104.495 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DcrQWENwqx3n for <ietfarch-v6ops-archive@core3.amsl.com>; Wed, 27 Aug 2008 12:10:25 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 281F83A699D for <v6ops-archive@lists.ietf.org>; Wed, 27 Aug 2008 12:10:22 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-v6ops@ops.ietf.org>) id 1KYQOq-0002sN-5B for v6ops-data@psg.com; Wed, 27 Aug 2008 19:09:48 +0000
Received: from [17.254.13.23] (helo=mail-out4.apple.com) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <jhw@apple.com>) id 1KYQOm-0002rp-Gg for v6ops@ops.ietf.org; Wed, 27 Aug 2008 19:09:46 +0000
Received: from relay14.apple.com (relay14.apple.com [17.128.113.52]) by mail-out4.apple.com (Postfix) with ESMTP id 0BC203A23577; Wed, 27 Aug 2008 12:09:44 -0700 (PDT)
Received: from relay14.apple.com (unknown [127.0.0.1]) by relay14.apple.com (Symantec Mail Security) with ESMTP id E472928040; Wed, 27 Aug 2008 12:09:43 -0700 (PDT)
X-AuditID: 11807134-ac568bb000000ece-9c-48b5a6771451
Received: from il0602f-dhcp90.apple.com (il0602f-dhcp90.apple.com [17.206.50.90]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by relay14.apple.com (Apple SCV relay) with ESMTP id B835528088; Wed, 27 Aug 2008 12:09:43 -0700 (PDT)
Cc: Dan Wing <dwing@cisco.com>, Mark Smith <ipng@69706e6720323030352d30312d31340a.nosense.org>
Message-Id: <15ECFC5E-7734-44ED-A652-7EFC795E6A39@apple.com>
From: james woodyatt <jhw@apple.com>
To: IPv6 Operations <v6ops@ops.ietf.org>
In-Reply-To: <48B50B10.9090005@free.fr>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Apple Message framework v928.1)
Subject: Re: Some suggestions for draft-ietf-v6ops-cpe-simple-security-03
Date: Wed, 27 Aug 2008 12:09:43 -0700
References: <20080824204553.08131c65.ipng@69706e6720323030352d30312d31340a.nosense.org> <48B1CCE8.1070305@gmail.com> <01af01c9065b$b4602440$c2f0200a@cisco.com> <48B23391.1090503@gmail.com> <01cd01c90672$a57c8790$c2f0200a@cisco.com> <48B31DA3.6080001@gmail.com> <07d201c906f7$50a85e30$c2f0200a@cisco.com> <48B32B43.5010103@gmail.com> <084c01c906fe$f9bf1840$c2f0200a@cisco.com> <48B33430.40704@gmail.com> <08b901c90710$4064aa60$c2f0200a@cisco.com> <48B354FA.7040601@gmail.com> <48B50B10.9090005@free.fr>
X-Mailer: Apple Mail (2.928.1)
X-Brightmail-Tracker: AAAAAA==
Sender: owner-v6ops@ops.ietf.org
Precedence: bulk
List-ID: <v6ops.ops.ietf.org>

On Aug 27, 2008, at 01:06, Rémi Després wrote:
> Brian E Carpenter   (m/j/a) 8/26/08 2:57 AM:
>> On 2008-08-26 12:11, Dan Wing wrote:
>>> Brian E Carpenter wrote:
>>>> But blocking tunnels by default, although it's simple, also
>>>> blocks innovation. That worries me.
>>> Would your worry go away if the IETF initiated a standards effort  
>>> around
>>> something like Apple's ALD (draft-woodyatt-ald-03.txt)?
>> I believe that something like that is needed.
>
> I also support that remote control of packet filtering should be  
> standardized.
>
> IMO, its scope should cover both:
> - CPE control by hosts
> - control of ISP provided filtering devices by customer sites.


I must chime in here and repeat for the record that ALD is most  
emphatically NOT a protocol for enabling hosts to control filtering  
devices.  I took Great Pains to specify it as a protocol for filtering  
devices to learn about interior applications that are soliciting  
inbound traffic from arbitrary exterior nodes regardless of their  
remote address.

Please please please I am VERY resistant to positioning ALD as a  
method for nodes to use in "controlling" firewall devices.


--
james woodyatt <jhw@apple.com>
member of technical staff, communications engineering