RE: Some suggestions for draft-ietf-v6ops-cpe-simple-security-03

"Dan Wing" <dwing@cisco.com> Wed, 27 August 2008 14:50 UTC

Return-Path: <owner-v6ops@ops.ietf.org>
X-Original-To: ietfarch-v6ops-archive@core3.amsl.com
Delivered-To: ietfarch-v6ops-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CDAB63A6BF1 for <ietfarch-v6ops-archive@core3.amsl.com>; Wed, 27 Aug 2008 07:50:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.159
X-Spam-Level:
X-Spam-Status: No, score=-4.159 tagged_above=-999 required=5 tests=[AWL=0.036, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id koFnirZTw-P4 for <ietfarch-v6ops-archive@core3.amsl.com>; Wed, 27 Aug 2008 07:50:09 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 54B8B3A683A for <v6ops-archive@lists.ietf.org>; Wed, 27 Aug 2008 07:50:06 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-v6ops@ops.ietf.org>) id 1KYMIk-000G18-1x for v6ops-data@psg.com; Wed, 27 Aug 2008 14:47:14 +0000
Received: from [171.71.176.71] (helo=sj-iport-2.cisco.com) by psg.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.69 (FreeBSD)) (envelope-from <dwing@cisco.com>) id 1KYMIc-000G04-Hv for v6ops@ops.ietf.org; Wed, 27 Aug 2008 14:47:11 +0000
X-IronPort-AV: E=Sophos;i="4.32,279,1217808000"; d="scan'208";a="78573406"
Received: from sj-dkim-4.cisco.com ([171.71.179.196]) by sj-iport-2.cisco.com with ESMTP; 27 Aug 2008 14:47:06 +0000
Received: from sj-core-2.cisco.com (sj-core-2.cisco.com [171.71.177.254]) by sj-dkim-4.cisco.com (8.12.11/8.12.11) with ESMTP id m7REl6R5031688; Wed, 27 Aug 2008 07:47:06 -0700
Received: from dwingwxp01 ([10.32.240.194]) by sj-core-2.cisco.com (8.13.8/8.13.8) with ESMTP id m7REl5oX002554; Wed, 27 Aug 2008 14:47:05 GMT
From: Dan Wing <dwing@cisco.com>
To: 'Gert Doering' <gert@space.net>, 'Rémi Després' <remi.despres@free.fr>
Cc: 'Truman Boyes' <truman@suspicious.org>, 'Brian E Carpenter' <brian.e.carpenter@gmail.com>, 'Mark Smith' <ipng@69706e6720323030352d30312d31340a.nosense.org>, jhw@apple.com, 'IPv6 Operations' <v6ops@ops.ietf.org>
References: <01cd01c90672$a57c8790$c2f0200a@cisco.com> <48B31DA3.6080001@gmail.com> <07d201c906f7$50a85e30$c2f0200a@cisco.com> <48B32B43.5010103@gmail.com> <084c01c906fe$f9bf1840$c2f0200a@cisco.com> <48B33430.40704@gmail.com> <A31EB889-2BD9-4283-A408-AB6DCC1D568A@suspicious.org> <08be01c90712$d876cd40$c2f0200a@cisco.com> <20080826114919.GN19694@Space.Net> <48B51578.6000602@free.fr> <20080827091221.GY19694@Space.Net>
Subject: RE: Some suggestions for draft-ietf-v6ops-cpe-simple-security-03
Date: Wed, 27 Aug 2008 07:47:05 -0700
Message-ID: <013101c90853$c641d240$c2f0200a@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook 11
Thread-Index: AckIJQqD6fVyq8ixQZCSyiw8guABewALmbVA
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198
In-Reply-To: <20080827091221.GY19694@Space.Net>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=2183; t=1219848426; x=1220712426; c=relaxed/simple; s=sjdkim4002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=dwing@cisco.com; z=From:=20=22Dan=20Wing=22=20<dwing@cisco.com> |Subject:=20RE=3A=20Some=20suggestions=20for=20draft-ietf-v 6ops-cpe-simple-security-03 |Sender:=20; bh=rruClpIM//amV6On2QF3oZlcl1LdEJIejSZ1nSeGqmc=; b=DKqwhbAohrOs0wEns4LsSiuBxC505rrCs/PjimCawpVpBI9+iufi9yln2K q3wzDlqbBFGHVHQEf94htVtL4IT89koJS/NJm6po9oCeftWE4LdbQLvXIAdY 2vCv1OQuha;
Authentication-Results: sj-dkim-4; header.From=dwing@cisco.com; dkim=pass ( sig from cisco.com/sjdkim4002 verified; );
Sender: owner-v6ops@ops.ietf.org
Precedence: bulk
List-ID: <v6ops.ops.ietf.org>

 

> -----Original Message-----
> From: Gert Doering [mailto:gert@space.net] 
> Sent: Wednesday, August 27, 2008 2:12 AM
> To: Rémi Després
> Cc: Gert Doering; Dan Wing; 'Truman Boyes'; 'Brian E 
> Carpenter'; 'Mark Smith'; jhw@apple.com; 'IPv6 Operations'
> Subject: Re: Some suggestions for 
> draft-ietf-v6ops-cpe-simple-security-03
> 
> Hi,
> 
> On Wed, Aug 27, 2008 at 10:51:04AM +0200, Rémi Després wrote:
> > >What is "internal to external" is inevitably "external to 
> internal" to
> > >someone else.
> > >
> > >How do you solve "tunneling is permitted if solicited from 
> the inside" for 
> > >the
> > >
> > >  Host A --- CPE A ----[Internet]---- CBE B --- Host B
> > >
> > >case?
> > 
> > In my understanding, there is no ambiguity.
> [..]
> >
> > Filtering control, if not dministrative, should always come 
> from the 
> > internal side (from A to CPE A, from B to CPE B).
> 
> Staying in the context of the original discussion: if you 
> want to permit
> tunneled packets for IPv6 (or other) purposes, but at the 
> same time insist
> that "packets must be solicited from the internal side", how 
> do you make
> the scenario above work?
>
> That was my whole point.  The argument "the CPE will know 
> what the host
> wants to receive" doesn't work for enduser-to-enduser traffic, unless
> you have a signalling mechanism.  

Right - we need a signaling mechanism (something like Apple's
ALD, which is described in the draft).

> Or you just permit tunnels.

I don't understand why a tunnel should get an excemption from 
Simple Security.  A tunnel can be used as an attack vector as
easily as native protocols (Netbios, FTP, HTTP, or NFS server).

-d

> Gert Doering
>         -- NetMaster
> -- 
> Total number of prefixes smaller than registry allocations:  128645
> 
> SpaceNet AG                        Vorstand: Sebastian v. Bomhard
> Joseph-Dollinger-Bogen 14          Aufsichtsratsvors.: A. 
> Grundner-Culemann
> D-80807 Muenchen                   HRB: 136055 (AG Muenchen)
> Tel: +49 (89) 32356-444            USt-IdNr.: DE813185279
>