Re: [v6ops] draft-ietf-v6ops-balanced-ipv6-security WGLC

Mark ZZZ Smith <markzzzsmith@yahoo.com.au> Wed, 20 November 2013 20:05 UTC

Return-Path: <markzzzsmith@yahoo.com.au>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EF431AE14E for <v6ops@ietfa.amsl.com>; Wed, 20 Nov 2013 12:05:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.498
X-Spam-Level:
X-Spam-Status: No, score=-1.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oSBNhstuA1Ei for <v6ops@ietfa.amsl.com>; Wed, 20 Nov 2013 12:05:49 -0800 (PST)
Received: from nm9-vm0.bullet.mail.bf1.yahoo.com (nm9-vm0.bullet.mail.bf1.yahoo.com [98.139.213.154]) by ietfa.amsl.com (Postfix) with ESMTP id 05F7C1AE12D for <v6ops@ietf.org>; Wed, 20 Nov 2013 12:05:48 -0800 (PST)
Received: from [98.139.215.142] by nm9.bullet.mail.bf1.yahoo.com with NNFMP; 20 Nov 2013 20:05:42 -0000
Received: from [98.139.212.193] by tm13.bullet.mail.bf1.yahoo.com with NNFMP; 20 Nov 2013 20:05:42 -0000
Received: from [127.0.0.1] by omp1002.mail.bf1.yahoo.com with NNFMP; 20 Nov 2013 20:05:42 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 437999.32440.bm@omp1002.mail.bf1.yahoo.com
Received: (qmail 86916 invoked by uid 60001); 20 Nov 2013 20:05:42 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com.au; s=s1024; t=1384977942; bh=DMQ/+gcZwie5cgOC9pQsmHl9Zj5m9dV+6crs2auMKjM=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=w4NCrQAIygI/rvWdIsTDZiPblRBEZCdpiPsySsSBvLUUAN4e3/NMipCA8jVnHNB1TFWS4D5Jmet6HpyfCtax4PkZqbMEMaqyQIfmXktFDpn8CWkX5x3/vIOUfDb7HFJbuQAYoHd8bNk/D/2zGnSksE3XmgWp1jAjkU6qTdF/alY=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com.au; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=3+A3IueAi/pwGrTRDJsb2OMZM2U/x9T2zbDoF2GF1jgv54qjd0YSb2vQv0qSPRmkdkS2FXoqLLnYu0BotA05Yx07BrVTyDVagffwLutx4oQG4H+8dh/mh4TgCLnqXixbQtbGHcOSFlOtL+UjeY1w9zAVX9mXCtQE0o08ScoS6tA=;
X-YMail-OSG: eHwuk64VM1lQ57CuV9kK1JAQQ8dukV38ZmWNMjnHHKxJqwv X6cCDcnXLwIECw6F4yb9i9T00wjHwZukA6IE4wAct6NFsg7jlQrTyGGOW6Pz PkGMqNq3QScSn3wHqFG.tlMVarftw9fFO0mIJD.BFJ2oN_NeWVbG6ofsYyDC dHuZsg8EI2SApFUmBnDQoytGoxjc0xORFN6kTrPTFZAw.AMis7ptloovrm2Y jU6kBGV0d7yCjDO3lZUJiGsLivANPD1_.DJnv03PMCJhfTwogzxhb41YShLq DQEgNRywUZHCGo61f4aLc.7EN5m82PodbK8T1P_41YxRnwHiiOQn1R.vn8OI gLFeRA7jNIyKw94rv7BCzdAAP7tVA9GAA1ArVzs.gpLGJiYawgsXXgix2WMA .3NLN8GLYLOk2sTDYqqeNpld_6tmPNt_Ws35ohkrjOB.c9vNzO8XhEbLg2.v uHAdSSZDTkMavOk14mKQgbw1kBRlMfbk8ckTn7NfUE4Ja.gcBxHjcsXKrU0I 0D026asJyhsWxEBBCu08DZ2cBQlDr2WAmpyG.gm6Vby.1.rSwAzlyUGjxGgF 9ZTql_4nVsDkX.Sl99u.FG1AnxwfR0vMVmZDyw6_fD08R
Received: from [150.101.221.237] by web142504.mail.bf1.yahoo.com via HTTP; Wed, 20 Nov 2013 12:05:41 PST
X-Rocket-MIMEInfo: 002.001, CgoKCgo.X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KPiBGcm9tOiBMb3JlbnpvIENvbGl0dGkgPGxvcmVuem9AZ29vZ2xlLmNvbT4KPlRvOiBSYXkgSHVudGVyIDx2Nm9wc0BnbG9iaXMubmV0PiAKPkNjOiAidjZvcHNAaWV0Zi5vcmcgV0ciIDx2Nm9wc0BpZXRmLm9yZz4gCj5TZW50OiBXZWRuZXNkYXksIDIwIE5vdmVtYmVyIDIwMTMgOToxNyBQTQo.U3ViamVjdDogUmU6IFt2Nm9wc10gZHJhZnQtaWV0Zi12Nm9wcy1iYWxhbmNlZC1pcHY2LXNlY3VyaXR5IFdHTEMKPiAKPgo.Cj5PbiBXZWQsIE4BMAEBAQE-
X-Mailer: YahooMailWebService/0.8.166.601
References: <201311101900.rAAJ0AR6025350@irp-view13.cisco.com> <CAB0C4xOfz_JAjEEJZ-Zz7MBEyZhVzrAE+8Ghf1ggC3+9pyHmNg@mail.gmail.com> <989B8ED6-273E-45D4-BFD8-66A1793A1C9F@cisco.com> <5288FC15.5080508@globis.net> <CAKD1Yr1gQ8r80NxbJwxbNc8esm1ekk1JGMUoQo712CpvLJ8ogw@mail.gmail.com> <528C6E76.1010704@globis.net> <CAKD1Yr3Jfv+4+_KYHzkDP=Sm2-5jvDs_V32wrJ74YY_gZi-3AQ@mail.gmail.com> <528C8878.4090808@globis.net> <CAKD1Yr2oAR7Zz_iTPSwfjFLRnYHofOsfvcnQ8jsYTeurnf7NrA@mail.gmail.com>
Message-ID: <1384977941.86783.YahooMailNeo@web142504.mail.bf1.yahoo.com>
Date: Wed, 20 Nov 2013 12:05:41 -0800
From: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>
To: Lorenzo Colitti <lorenzo@google.com>, Ray Hunter <v6ops@globis.net>
In-Reply-To: <CAKD1Yr2oAR7Zz_iTPSwfjFLRnYHofOsfvcnQ8jsYTeurnf7NrA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: "v6ops@ietf.org WG" <v6ops@ietf.org>
Subject: Re: [v6ops] draft-ietf-v6ops-balanced-ipv6-security WGLC
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: Mark ZZZ Smith <markzzzsmith@yahoo.com.au>
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Nov 2013 20:05:51 -0000





>________________________________
> From: Lorenzo Colitti <lorenzo@google.com>
>To: Ray Hunter <v6ops@globis.net> 
>Cc: "v6ops@ietf.org WG" <v6ops@ietf.org> 
>Sent: Wednesday, 20 November 2013 9:17 PM
>Subject: Re: [v6ops] draft-ietf-v6ops-balanced-ipv6-security WGLC
> 
>
>
>On Wed, Nov 20, 2013 at 7:01 PM, Ray Hunter <v6ops@globis.net> wrote:
>
>So what does the draft really say?
>>
>>Here's some filtering rules, that you may or may not like, which may or
>>may not be overridden, which may change over time, which only mitigate a
>>very limited number of threats, and maybe the ISP will manage the
>>security policy but maybe the end user wants to take this responsibility
>>
>
>
>Pretty much. Oh, and "this ISP has rolled it out and has not seen any issues so far".
> 

How do they know? What methods have they used to be sure of that? All it sounds like is that they've passively waited for any complaints after deploying this, and as they haven't heard any, they've decided that the _only reason_ they haven't heard complaints is because their measure has worked. That is not evidence.

How do they know IPv6's large address space isn't the actual thing that has prevented their customers being attacked?

How do they know that host based firewalls isn't the reason that there hasn't been a successful attack?


How do they know that there hasn't been an attack, and it is just that they don't know about it? 

Where is the _measurement_ of the effectiveness or not of this, and where is the evidence that some other measure isn't the reason that there haven't been any known attacks?



>Where's the evidence to say that this approach is any better than an
>>open security policy of "allow everything bi-directionally" ?
>>
>
>
>None, but none is required because nobody is trying to make such a statement. Which is good, because there is zero chance of this or any other IETF working group (or actually, any group of more than... oh, about 3 engineers) agreeing on such statement.
> 
>The threats are listed in the draft as:
>>
>>   o  denial of service by packet flooding: overwhelming either the
>>      access bandwidth or the bandwidth of a slower link in the
>>      residential network (like a slow home automation network) or the
>>      CPU power of a slow IPv6 host (like networked thermostat or any
>>      other sensor type nodes);
>>
>>not covered. 
>
>>   o  denial of service by Neighbor Discovery cache exhaustion
>>      [RFC6583]: the outside attacker floods the inside prefix(es) with
>>      packets with a random destination address forcing the CPE to
>>      exhaust its memory and its CPU in useless Neighbor Solicitations;
>>
>>not covered. 
>
>>   o  denial of service by service requests: like sending print jobs
>>      from the Internet to an ink jet printer until the ink cartridge is
>>      empty or like filing some file server with junk data;
>>
>>not covered.e.g. port 515
>>
>>   o  unauthorized use of services: like accessing a webcam or a file
>>      server which are open to anonymous access within the residential
>>      network but should not be accessed from outside of the home
>>      network or accessing to remote desktop or SSH with weak password
>>      protection;
>>
>>not covered. e.g. port 8080.
>>
>>   o  exploiting a vulnerability in the host in order to get access to
>>      data or to execute some arbitrary code in the attacked host such
>>      as several against old versions of Windows;
>>
>>not covered.
>>
>>   o  trojanized host (belonging to a Botnet) can communicate via a
>>      covert channel to its master and launch attacks to Internet
>>      targets.
>>
>>not covered.
>>
>
>
>Right. And the draft doesn't claim that to addresses those threats.
> 
>And in the Security section, the draft only addresses "Unauthorized
>>access because vulnerable ports are blocked" ?
>>
>
>
>Yep. As the abstract says, it's a balance.
>
>
>But the point about this draft is not the filtering policy itself, and in fact, the document makes no claims about what the policy should be. (This is good, because there's no chance of the WG ever agreeing on any specific policy.) It simply says, "here are some threats. here's what we rolled out. here's what we found out." IMO this is perfectly acceptable for an operational group such as this one, and it is of value because it represents real operational experience.
>
>
>IMHO this threat is anyway blocked by machine firewalls running on every
>>modern OS shipping today (any device that is likely to support IPv6)
>>
>
>
>I agree with you, but good luck finding lots of other people who do.
>
>
>As an aside, I'm confused how can you simultaneously make the argument that the draft doesn't cover port 515 and port 8080, and then in the same breath say that that threat is blocked anyway by any device that is likely to support IPv6. But again, neither is really the point of this draft.
>
>
>Cheees,
>Lorenzo
>
>_______________________________________________
>v6ops mailing list
>v6ops@ietf.org
>https://www.ietf.org/mailman/listinfo/v6ops
>
>
>